Digital Citizenship - Legal Terms Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mvargas811
M
Mvargas811
Community Contributor
Quizzes Created: 1 | Total Attempts: 140
Questions: 10 | Attempts: 140

SettingsSettingsSettings
Digital Citizenship Quizzes & Trivia

Questions and Answers
  • 1. 

    What is the term used to described someone who gains access to someone else's computer system or network without permission?

    • A.

      Freelancer

    • B.

      Webmaster

    • C.

      Hacker

    Correct Answer
    C. Hacker
    Explanation
    The term used to describe someone who gains access to someone else's computer system or network without permission is "hacker". Hackers are individuals who use their technical skills and knowledge to exploit vulnerabilities in computer systems or networks, often with malicious intent. They can steal sensitive information, disrupt services, or cause other types of harm.

    Rate this question:

  • 2. 

    What term describes the use of media tools to harass or embarrass someone?

    • A.

      Cybersquatting

    • B.

      Cyberbullying

    • C.

      Phishing

    Correct Answer
    B. Cyberbullying
    Explanation
    Cyberbullying is the correct answer because it refers to the use of media tools, such as social media platforms or messaging apps, to harass, intimidate, or embarrass someone. It involves sending malicious or hurtful messages, spreading rumors, or sharing embarrassing photos or videos online with the intention of causing emotional distress to the victim. This form of harassment is particularly prevalent in the digital age, where individuals can easily hide behind the anonymity of the internet to target others.

    Rate this question:

  • 3. 

    This is a crime that happens when someone steals your personal information such as credit card numbers and social security number.

    • A.

      Smishing

    • B.

      Identity theft

    • C.

      Spoofing

    Correct Answer
    B. Identity theft
    Explanation
    Identity theft is the correct answer because it refers to the crime of stealing someone's personal information, such as credit card numbers and social security numbers, with the intention of impersonating or using that information for fraudulent purposes. This crime involves illegally obtaining and using someone's personal identifying information without their consent, often resulting in financial loss and damage to the victim's reputation and credit history.

    Rate this question:

  • 4. 

    This term describes theft of intellectual property.

    • A.

      Piracy

    • B.

      Streaming

    • C.

      Troll

    Correct Answer
    A. Piracy
    Explanation
    Piracy is the correct answer because it refers to the act of stealing or unauthorized copying of intellectual property, such as music, movies, software, or books. It involves the illegal distribution or reproduction of copyrighted material without permission from the rightful owner. This term is commonly used to describe the theft of intellectual property in various forms, including online piracy, where copyrighted content is shared or downloaded without the consent of the creators or copyright holders.

    Rate this question:

  • 5. 

    This terms describes sending sexually explicit text messages.

    • A.

      Texting

    • B.

      Tweeting

    • C.

      Sexting

    Correct Answer
    C. Sexting
    Explanation
    Sexting is the correct answer because it refers to the act of sending sexually explicit text messages. It involves sending messages that contain explicit language, photos, or videos of a sexual nature. Sexting has become increasingly common with the rise of smartphones and social media platforms, allowing individuals to engage in this behavior easily. It is important to note that sexting can have legal and social consequences, especially when involving minors.

    Rate this question:

  • 6. 

    This is the software that goes on your computer without your knowledge and steals your personal information.

    • A.

      Spyware

    • B.

      Tag

    • C.

      Webmail

    Correct Answer
    A. Spyware
    Explanation
    Spyware is a type of malicious software that is installed on a computer without the user's knowledge or consent. It is designed to gather personal information, such as passwords, credit card details, and browsing habits, and then transmit this data to third parties. Spyware can be used for various purposes, including identity theft, financial fraud, and targeted advertising. It poses a significant threat to users' privacy and security, making it essential to have robust antivirus and anti-spyware measures in place to detect and remove such software.

    Rate this question:

  • 7. 

    This term is short for malicious software. Some common examples are worms and viruses.

    • A.

      Adware

    • B.

      Mashup

    • C.

      Malware

    Correct Answer
    C. Malware
    Explanation
    Malware is the correct answer because it is a term that refers to malicious software. It encompasses various types of harmful programs, such as worms and viruses. These types of software are designed to disrupt computer systems, steal information, or cause other harmful effects. Therefore, malware is the appropriate term to describe this category of software.

    Rate this question:

  • 8. 

    This is a software program that hides inside regular programs and can cause much harm to your computer. Similar name to the one in Greek mythology.

    • A.

      Trojan horse

    • B.

      Meme

    • C.

      Pharming

    Correct Answer
    A. Trojan horse
    Explanation
    A trojan horse is a type of malicious software that disguises itself as a regular program, tricking users into installing it. Once installed, it can cause significant harm to the computer by stealing personal information, damaging files, or allowing unauthorized access. The term "trojan horse" is derived from Greek mythology, where the Greeks used a giant wooden horse to sneak soldiers into the city of Troy. Similarly, a trojan horse software sneaks into a computer system, posing as something harmless, but causing harm once inside.

    Rate this question:

  • 9. 

    What is another name for unsolicited email messages?

    • A.

      Spam

    • B.

      Adware

    • C.

      Applet

    Correct Answer
    A. Spam
    Explanation
    Unsolicited email messages are commonly referred to as spam. Spam refers to unwanted or unsolicited messages, typically sent in bulk, often for advertising or promotional purposes. It is considered a nuisance and can clog up email inboxes, causing inconvenience for users.

    Rate this question:

  • 10. 

    This is a program that duplicates itself and spreads throughout your computer, destroying files and changing data.

    • A.

      Attachment

    • B.

      Banner ad

    • C.

      Virus

    Correct Answer
    C. Virus
    Explanation
    The given correct answer is "virus". A virus is a type of malicious software that can replicate itself and spread to other files or computers. It is designed to cause harm by destroying files and altering data. This explanation aligns with the description provided in the question, which mentions a program that duplicates itself and spreads while causing damage to files and data.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 04, 2015
    Quiz Created by
    Mvargas811
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.