This site is 100% ad supported. Please add an exception to adblock for this site.

Info Tech Quiz 4

Terms

undefined, object
copy deck
private
when the other side gets back scrambled data their use their ___ key to unscramble it bcause only they have it
ISPs
gives everyone access to the Internet
IP addresses
ISPs have a limited number of _____ they can give out
Internet Service Provider
ISP
online profiling
commercial websites would like to take as much personal info. from you as possible. taking this info, is called _______
no
is it okay to forward emails from people without their consent?
WEP
uses a key to encrypt the data
wired network
are typically how we connect desktop computers to our system of resources
encryption
the process of obscuring information to make it unreadable without special knowledge
cookies
websites will put a file on your computer in order to track where you go and what you do on the Interent. this is called _____
internet
the higher level view of all these smaller systems operating together
no
is it appropriate to cause harm using an anonymous email account?
no
are anonymous email accounts truly anonymous?
telecommunication system
a system that sends data
private policy
websites indicate what information they take from users and what they intend to do with it in their __________
WEP and WPA
the two main types of wireless security
IP addresses
are assigned to all computers that communicate on the Internet
no
can you expect privacy when you are on school email?
Wired Equivalency Privacy
WEP
security
when we have wireless networks we always need to be concerned about _____
encrypt
to secure information sent through the Internet we ___ it
the longer the more secure, the more different characters, the more secure
two ways to make password security more secure
spam and phishing
two things to be wary of in terms of email security
secure
when we send messages, etc. we have no say in how these messages get to thier final destination, but we can _____ the messages
no
can you expect privacy when you are on the Internet at school?
spam
electronic junkmail
https: or the padlock
you can tell if a website is secure if the have one or both of these signs
radio waves
wireless networks ar run using these which can be intercepted
key cryptography
in this type of encryption there is a key that is public and one that is private for each communicating party
WPA
This is more secure than WEP
network
is defined as one or more computers connected together using a telecommunication system for the purpose of communicating and sharing resources
encryption
is used to protect cell phone infromation and ATM transactions
access points
wireless networks consist of these
cryptography
the study of message security
target advertising
the information is analyzed and used to present ads that pertain to you
scrambled data
when we send data out, we use thier public key to encrypt the data, then we send back_____
passwords
we use these to allow use to log on to secure networks
WPA
uses a password or paraphrase to encrypt the data
no
is it okay to share private information about others in private or public settings on the Internet?
talk with parents about allowable information, read privacy policy, and be aware of surveys, contests, and questionaires
to protect you privacy you should do three 3 things.....
spam
unwanted messages that are unsolicited and sent to a large number of people
Wi-Fi Protected Access
WPA
wired and wireless
what are the two main types of networks?
wireless network
how we connect at school and at hot spots, and possibly home
password
a form of secret authentication data that is used to control access to a resource
share information, share resources, and communicate
why do we have networks?
phishing
an online con game used to attempt to gain access to personal information
encryption
we use this as extra security for our connection
Internet Protocol
IP
password
encrypts the information before we send it out of our computer

Deck Info

50

permalink