1.
What is the term used to described someone who gains access to someone else's computer system or network without permission?
Correct Answer
C. Hacker
Explanation
The term used to describe someone who gains access to someone else's computer system or network without permission is "hacker". Hackers are individuals who use their technical skills and knowledge to exploit vulnerabilities in computer systems or networks, often with malicious intent. They can steal sensitive information, disrupt services, or cause other types of harm.
2.
What term describes the use of media tools to harass or embarrass someone?
Correct Answer
B. Cyberbullying
Explanation
Cyberbullying is the correct answer because it refers to the use of media tools, such as social media platforms or messaging apps, to harass, intimidate, or embarrass someone. It involves sending malicious or hurtful messages, spreading rumors, or sharing embarrassing photos or videos online with the intention of causing emotional distress to the victim. This form of harassment is particularly prevalent in the digital age, where individuals can easily hide behind the anonymity of the internet to target others.
3.
This is a crime that happens when someone steals your personal information such as credit card numbers and social security number.
Correct Answer
B. Identity theft
Explanation
Identity theft is the correct answer because it refers to the crime of stealing someone's personal information, such as credit card numbers and social security numbers, with the intention of impersonating or using that information for fraudulent purposes. This crime involves illegally obtaining and using someone's personal identifying information without their consent, often resulting in financial loss and damage to the victim's reputation and credit history.
4.
This term describes theft of intellectual property.
Correct Answer
A. Piracy
Explanation
Piracy is the correct answer because it refers to the act of stealing or unauthorized copying of intellectual property, such as music, movies, software, or books. It involves the illegal distribution or reproduction of copyrighted material without permission from the rightful owner. This term is commonly used to describe the theft of intellectual property in various forms, including online piracy, where copyrighted content is shared or downloaded without the consent of the creators or copyright holders.
5.
This terms describes sending sexually explicit text messages.
Correct Answer
C. Sexting
Explanation
Sexting is the correct answer because it refers to the act of sending sexually explicit text messages. It involves sending messages that contain explicit language, photos, or videos of a sexual nature. Sexting has become increasingly common with the rise of smartphones and social media platforms, allowing individuals to engage in this behavior easily. It is important to note that sexting can have legal and social consequences, especially when involving minors.
6.
This is the software that goes on your computer without your knowledge and steals your personal information.
Correct Answer
A. Spyware
Explanation
Spyware is a type of malicious software that is installed on a computer without the user's knowledge or consent. It is designed to gather personal information, such as passwords, credit card details, and browsing habits, and then transmit this data to third parties. Spyware can be used for various purposes, including identity theft, financial fraud, and targeted advertising. It poses a significant threat to users' privacy and security, making it essential to have robust antivirus and anti-spyware measures in place to detect and remove such software.
7.
This term is short for malicious software. Some common examples are worms and viruses.
Correct Answer
C. Malware
Explanation
Malware is the correct answer because it is a term that refers to malicious software. It encompasses various types of harmful programs, such as worms and viruses. These types of software are designed to disrupt computer systems, steal information, or cause other harmful effects. Therefore, malware is the appropriate term to describe this category of software.
8.
This is a software program that hides inside regular programs and can cause much harm to your computer. Similar name to the one in Greek mythology.
Correct Answer
A. Trojan horse
Explanation
A trojan horse is a type of malicious software that disguises itself as a regular program, tricking users into installing it. Once installed, it can cause significant harm to the computer by stealing personal information, damaging files, or allowing unauthorized access. The term "trojan horse" is derived from Greek mythology, where the Greeks used a giant wooden horse to sneak soldiers into the city of Troy. Similarly, a trojan horse software sneaks into a computer system, posing as something harmless, but causing harm once inside.
9.
What is another name for unsolicited email messages?
Correct Answer
A. Spam
Explanation
Unsolicited email messages are commonly referred to as spam. Spam refers to unwanted or unsolicited messages, typically sent in bulk, often for advertising or promotional purposes. It is considered a nuisance and can clog up email inboxes, causing inconvenience for users.
10.
This is a program that duplicates itself and spreads throughout your computer, destroying files and changing data.
Correct Answer
C. Virus
Explanation
The given correct answer is "virus". A virus is a type of malicious software that can replicate itself and spread to other files or computers. It is designed to cause harm by destroying files and altering data. This explanation aligns with the description provided in the question, which mentions a program that duplicates itself and spreads while causing damage to files and data.