Digital Citizenship - Legal Terms Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mvargas811
M
Mvargas811
Community Contributor
Quizzes Created: 1 | Total Attempts: 145
| Attempts: 145 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. What is the term used to described someone who gains access to someone else's computer system or network without permission?

Explanation

The term used to describe someone who gains access to someone else's computer system or network without permission is "hacker". Hackers are individuals who use their technical skills and knowledge to exploit vulnerabilities in computer systems or networks, often with malicious intent. They can steal sensitive information, disrupt services, or cause other types of harm.

Submit
Please wait...
About This Quiz
Digital Citizenship - Legal Terms Quiz - Quiz

The 'Digital Citizenship - Legal Terms Quiz' assesses knowledge on key digital security issues like hacking, cyberbullying, identity theft, piracy, sexting, and spyware. It enhances understanding of personal... see morerights and responsibilities in the digital world, crucial for safe internet navigation. see less

2. This is a software program that hides inside regular programs and can cause much harm to your computer. Similar name to the one in Greek mythology.

Explanation

A trojan horse is a type of malicious software that disguises itself as a regular program, tricking users into installing it. Once installed, it can cause significant harm to the computer by stealing personal information, damaging files, or allowing unauthorized access. The term "trojan horse" is derived from Greek mythology, where the Greeks used a giant wooden horse to sneak soldiers into the city of Troy. Similarly, a trojan horse software sneaks into a computer system, posing as something harmless, but causing harm once inside.

Submit
3. This is the software that goes on your computer without your knowledge and steals your personal information.

Explanation

Spyware is a type of malicious software that is installed on a computer without the user's knowledge or consent. It is designed to gather personal information, such as passwords, credit card details, and browsing habits, and then transmit this data to third parties. Spyware can be used for various purposes, including identity theft, financial fraud, and targeted advertising. It poses a significant threat to users' privacy and security, making it essential to have robust antivirus and anti-spyware measures in place to detect and remove such software.

Submit
4. What term describes the use of media tools to harass or embarrass someone?

Explanation

Cyberbullying is the correct answer because it refers to the use of media tools, such as social media platforms or messaging apps, to harass, intimidate, or embarrass someone. It involves sending malicious or hurtful messages, spreading rumors, or sharing embarrassing photos or videos online with the intention of causing emotional distress to the victim. This form of harassment is particularly prevalent in the digital age, where individuals can easily hide behind the anonymity of the internet to target others.

Submit
5. This is a program that duplicates itself and spreads throughout your computer, destroying files and changing data.

Explanation

The given correct answer is "virus". A virus is a type of malicious software that can replicate itself and spread to other files or computers. It is designed to cause harm by destroying files and altering data. This explanation aligns with the description provided in the question, which mentions a program that duplicates itself and spreads while causing damage to files and data.

Submit
6. This is a crime that happens when someone steals your personal information such as credit card numbers and social security number.

Explanation

Identity theft is the correct answer because it refers to the crime of stealing someone's personal information, such as credit card numbers and social security numbers, with the intention of impersonating or using that information for fraudulent purposes. This crime involves illegally obtaining and using someone's personal identifying information without their consent, often resulting in financial loss and damage to the victim's reputation and credit history.

Submit
7. This terms describes sending sexually explicit text messages.

Explanation

Sexting is the correct answer because it refers to the act of sending sexually explicit text messages. It involves sending messages that contain explicit language, photos, or videos of a sexual nature. Sexting has become increasingly common with the rise of smartphones and social media platforms, allowing individuals to engage in this behavior easily. It is important to note that sexting can have legal and social consequences, especially when involving minors.

Submit
8. What is another name for unsolicited email messages?

Explanation

Unsolicited email messages are commonly referred to as spam. Spam refers to unwanted or unsolicited messages, typically sent in bulk, often for advertising or promotional purposes. It is considered a nuisance and can clog up email inboxes, causing inconvenience for users.

Submit
9. This term is short for malicious software. Some common examples are worms and viruses.

Explanation

Malware is the correct answer because it is a term that refers to malicious software. It encompasses various types of harmful programs, such as worms and viruses. These types of software are designed to disrupt computer systems, steal information, or cause other harmful effects. Therefore, malware is the appropriate term to describe this category of software.

Submit
10. This term describes theft of intellectual property.

Explanation

Piracy is the correct answer because it refers to the act of stealing or unauthorized copying of intellectual property, such as music, movies, software, or books. It involves the illegal distribution or reproduction of copyrighted material without permission from the rightful owner. This term is commonly used to describe the theft of intellectual property in various forms, including online piracy, where copyrighted content is shared or downloaded without the consent of the creators or copyright holders.

Submit
View My Results

Quiz Review Timeline (Updated): May 24, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 24, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 04, 2015
    Quiz Created by
    Mvargas811
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the term used to described someone who gains access to someone...
This is a software program that hides inside regular programs and can...
This is the software that goes on your computer without your knowledge...
What term describes the use of media tools to harass or embarrass...
This is a program that duplicates itself and spreads throughout your...
This is a crime that happens when someone steals your personal...
This terms describes sending sexually explicit text messages.
What is another name for unsolicited email messages?
This term is short for malicious software. Some common examples are...
This term describes theft of intellectual property.
Alert!

Advertisement