The Net, Movie About Internet Hackers

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Michellewhiting
M
Michellewhiting
Community Contributor
Quizzes Created: 1 | Total Attempts: 766
Questions: 10 | Attempts: 766

SettingsSettingsSettings
DotNET Quizzes & Trivia

QUIZ BASED ON THE MOVIE THE NET.


Questions and Answers
  • 1. 

    Whose Identity is stolen?

    • A.

      Ruth Marx

    • B.

      Cyber Bob

    • C.

      Angela Bennett

    • D.

      Jeff Gregg

    Correct Answer
    C. Angela Bennett
    Explanation
    Angela Bennett's identity is stolen.

    Rate this question:

  • 2. 

    What does Angela receive from Fed Ex?

    • A.

      Phone

    • B.

      Floppy Disk

    • C.

      CD Rom

    • D.

      Book

    Correct Answer
    B. Floppy Disk
    Explanation
    Angela receives a floppy disk from Fed Ex.

    Rate this question:

  • 3. 

    Where does Angela meet Jack?

    • A.

      California

    • B.

      Mexico

    • C.

      Florida

    • D.

      Spain

    Correct Answer
    B. Mexico
    Explanation
    Angela meets Jack in Mexico.

    Rate this question:

  • 4. 

    What is the name of the symbol on the website that is allowing unauthorized access?

    • A.

      Element

    • B.

      Shortcut

    • C.

      Table

    • D.

      Icon

    Correct Answer
    D. Icon
    Explanation
    The symbol on the website that is allowing unauthorized access is referred to as an "icon". Icons are visual representations used to convey information or perform actions. In this context, the presence of an icon suggests that there is a graphical element or button on the website that, when clicked or interacted with, grants unauthorized access to certain areas or functions.

    Rate this question:

  • 5. 

    What is the name of the company Angela works for?

    • A.

      Praetorian

    • B.

      Wall Street

    • C.

      Cathedral

    • D.

      Gatekeeper

    Correct Answer
    C. Cathedral
    Explanation
    Based on the given options, Cathedral is the only one that could potentially be a company name. Praetorian, Wall Street, and Gatekeeper do not typically refer to company names. Since no additional information is provided, it is assumed that Cathedral is the correct answer.

    Rate this question:

  • 6. 

    What is Angela's specialty in computers?

    • A.

      Virus protection

    • B.

      Internet Hacking

    • C.

      Software Programming

    • D.

      Beta Testing

    Correct Answer
    D. Beta Testing
    Explanation
    Angela's specialty in computers is beta testing. Beta testing refers to the process of testing a software or application before its official release to identify and fix any bugs or issues. It involves testing the software in real-world scenarios to ensure its functionality, usability, and compatibility. This specialty requires a thorough understanding of software development and the ability to provide valuable feedback to improve the product.

    Rate this question:

  • 7. 

    What are the Praetorians after?

    • A.

      The program disk

    • B.

      Computers

    • C.

      Ruth Marx

    • D.

      Passports

    Correct Answer
    A. The program disk
    Explanation
    The Praetorians are after the program disk. This implies that they are seeking to obtain or gain control of the program disk for some purpose. The program disk likely contains important or valuable information that the Praetorians want to access or use for their own benefit. It could be a crucial component for their operations or hold sensitive data that they want to exploit. The exact reasons for their pursuit of the program disk are not provided, but it is clear that it holds significance to them.

    Rate this question:

  • 8. 

    What do you call the people that steal information from the Internet?

    • A.

      Programmers

    • B.

      Hackers

    • C.

      Program Systems Analyst

    • D.

      Typists

    Correct Answer
    B. Hackers
    Explanation
    Hackers are individuals who steal information from the internet. They possess advanced computer skills and use various techniques to gain unauthorized access to computer systems and networks. Hackers can exploit vulnerabilities in software or use social engineering tactics to trick individuals into revealing sensitive information. Their motives can vary, ranging from personal gain to activism or espionage. It is important to note that not all hackers engage in illegal activities, as there are also ethical hackers who work to identify and fix security vulnerabilities.

    Rate this question:

  • 9. 

    How does Angela alert the FBI?

    • A.

      Letter

    • B.

      Email

    • C.

      Phone call

    • D.

      Media

    Correct Answer
    B. Email
    Explanation
    Angela alerts the FBI by sending an email.

    Rate this question:

  • 10. 

    What is the name of the security program used?

    • A.

      Gatekeeper

    • B.

      Praetorian

    • C.

      Beta Ware

    • D.

      Icon

    Correct Answer
    A. Gatekeeper
    Explanation
    Gatekeeper is the correct answer because it is a commonly used security program. Gatekeeper is a feature of Apple's macOS operating system that helps protect the system from downloading and installing malicious software. It verifies the digital signatures of applications and allows only trusted software to run on the system, providing an additional layer of security against potential threats. Praetorian, Beta Ware, and Icon are not commonly known security programs, making them incorrect options.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 11, 2010
    Quiz Created by
    Michellewhiting

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.