
Fundamentals of Computing - Midterm Review
Quiz by Cardelia Brewer
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
A person would want to set up a personal hotspot because .
for customization, a person can use a personal hotspot to customize the appearance of their mobile device.
for cost, using a personal hotspot is less expensive than using a public network.
for access, a person can assess more websites with a personal hotspot than with a public network.
for security reasons, a personal hotspot is more secure than a public network.
60s - Q2
Data moves quickly between a computer and the Internet with a connection.
broadband
skinny
dial-up
bandwidth
60s - Q3
Hackers records their keystrokes using a .
exploiter
keylogger
screen logger
scanner
60s - Q4
During a man-in-the-middle attack, information about a person's visit appears on the hacker's computer if the website is .
legit
unsecured
blocked
secured
60s - Q5
retains information about a person's visit until their web browser is closed.
Sesame cookie
Session cookie
Persistent cookie
Preferred cookie
60s - Q6
should be shredded them keep safe against identity theft.
Printouts from news websites
Financial statements
How-to-manuals
Junk mail
60s - Q7
When an attacker controls someone's device remotely, the device has been infected by a .
robot network
phantom
bot herder
zombie
60s - Q8
Public key encryption protects an electronic message by .
hiding the message behind a firewall.
the receiver needing the right secret key to read the message.
entering the correct password to access the message.
sending the message using an algorithm that makes the transmission undetectable.
60s - Q9
What does an attacker use to intercept online banking transactions?
man-in-the-middle trojan
code logger
interception software
social engineering
60s - Q10
How can a person verify that an email message contains a legitimate concern from a company?
By clicking a link in the email.
By entering the company's web address in a web browser to visit their website, and then sign in.
By checking for the company's logo in the email message.
By reading the email message carefully.
60s - Q11
What occurs when attackers use third-party advertising to infect someone's computer?
javascripting
phishing
spamming
malvertising
60s - Q12
How is a person's account information stored for future payments?
Using an autopay system
Using a barcode reader
Using point of sale
Using a digital wallet
60s - Q13
What are e-commerce transactions between businesses and customers?
P2P (Person-to-person)
C2B (Customer-to-business)
B2C (Business-to-customer)
B2B (Business-to-business)
60s - Q14
How are victims baited into having money stolen and malware transmitted?
By phishing
By abbreviating URLs
By social media mask
By social engineering
60s - Q15
Why should anyone be particular when sharing information on social networking sites?
Because the chance of an online contact stealing a person's identity is very low.
Because information can stay active long after it has been removed from the web.
Because everyone is sharing personal information, which reduces the risk of identity theft.
Because the more personal information that is shared, the move trustworthy he/she appears.
60s