placeholder image to represent content

Fundamentals of Computing - Midterm Review

Quiz by Cardelia Brewer

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
24 questions
Show answers
  • Q1

    A person would want to set up a personal hotspot because                        .

    for customization, a person can use a personal hotspot to customize the appearance of their mobile device.

    for cost, using a personal hotspot is less expensive than using a public network.

    for access, a person can assess more websites with a personal hotspot than with a public network.

    for security reasons, a personal hotspot is more secure than a public network.

    60s
  • Q2

    Data moves quickly between a computer and the Internet with a                            connection.

    broadband

    skinny

    dial-up

    bandwidth

    60s
  • Q3

    Hackers records their keystrokes using a                               .

    exploiter

    keylogger

    screen logger

    scanner

    60s
  • Q4

    During a man-in-the-middle attack, information about a person's visit appears on the hacker's computer if the website is                                .

    legit

    unsecured

    blocked

    secured

    60s
  • Q5

                                                retains information about a person's visit until their web browser is closed.

    Sesame cookie

    Session cookie

    Persistent cookie

    Preferred cookie

    60s
  • Q6

                                     should be shredded them keep safe against identity theft.

    Printouts from news websites

    Financial statements

    How-to-manuals

    Junk mail

    60s
  • Q7

    When an attacker controls someone's device remotely, the device has been infected by a                                .

    robot network

    phantom

    bot herder

    zombie

    60s
  • Q8

    Public key encryption protects an electronic message by                                  .

    hiding the message behind a firewall.

    the receiver needing the right secret key to read the message.

    entering the correct password to access the message.

    sending the message using an algorithm that makes the transmission undetectable.

    60s
  • Q9

    What does an attacker use to intercept online banking transactions?

    man-in-the-middle trojan

    code logger

    interception software

    social engineering

    60s
  • Q10

    How can a person verify that an email message contains a legitimate concern from a company?

    By clicking a link in the email.

    By entering the company's web address in a web browser to visit their website, and then sign in.

    By checking for the company's logo in the email message.

    By reading the email message carefully.

    60s
  • Q11

    What occurs when attackers use third-party advertising to infect someone's computer?

    javascripting

    phishing

    spamming

    malvertising

    60s
  • Q12

    How is a person's account information stored for future payments?

    Using an autopay system

    Using a barcode reader

    Using point of sale

    Using a digital wallet

    60s
  • Q13

    What are e-commerce transactions between businesses and customers?

    P2P (Person-to-person)

    C2B (Customer-to-business)

    B2C (Business-to-customer)

    B2B (Business-to-business)

    60s
  • Q14

    How are victims baited into having money stolen and malware transmitted?

    By phishing

    By abbreviating URLs

    By social media mask

    By social engineering

    60s
  • Q15

    Why should anyone be particular when sharing information on social networking sites?

    Because the chance of an online contact stealing a person's identity is very low.

    Because information can stay active long after it has been removed from the web.

    Because everyone is sharing personal information, which reduces the risk of identity theft.

    Because the more personal information that is shared, the move trustworthy he/she appears.

    60s

Teachers give this quiz to your class