1.
Cookies are small _________ written to your hard drive by websites you have visited.
2.
Cookies allow various entities to __________ your browsing habits and ___________ personal information about you without your consent.
3.
Cookies cannot be disabled.
4.
___________________ ads are targeted advertisements based on the cookies on your hard drive.
5.
Examples of ubiquitous computing include the use of
A. 
B. 
C. 
D. 
6.
RFID are used by used by stores to control ___________ and to identify lost ___________and gather information about individuals from their _________
A. 
B. 
C. 
D. 
E. 
7.
Technologies that jeopardize anonymity
A. 
B. 
Global Positioning System
C. 
D. 
Radio Frequency Identification
E. 
8.
_________ has become more difficult due to the use of computers and the Internet.
9.
_____________ are computer hobbyists who attempt to obtain unlawful network access.
10.
_______________ refers to the dangerous actions a virus performs.
11.
IP ____________ sends a message with an IP address disguised as a message from a trusted source.
A. 
B. 
C. 
D. 
12.
_______________ is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems
A. 
B. 
C. 
D. 
13.
The act of secretly removing RAM chips from office computers and selling them
A. 
B. 
C. 
D. 
14.
The following is an example of ______________. A cashier at restaurant steals a $0.05 from every bill she processes.
A. 
B. 
C. 
D. 
15.
The following is an example of ______________. Katherine often goes through her employers' garage cans and locates discarded files of their clients and opens credit cards accounts in their names.
A. 
B. 
C. 
D. 
16.
Legislation currently in place in the United States to protect consumers from computer and cyber crimes include the
A. 
B. 
Health Insurance Portability and Privacy Act
C. 
Fair Health and Education Act
D. 
Family Education Rights and Privacy Act
17.
To protect your privacy online fill out forms only when the website displays
A. 
B. 
C. 
D. 
18.
______ are unsolicited messages sent via a cell phone or instant messaging service.
A. 
B. 
C. 
D. 
19.
A ______ virus attaches to data files and takes advantage of application macros.
20.
A _________ is a code concealed inside a program that can harm or destroy files.
21.
Viruses can spread via
A. 
B. 
C. 
D. 
22.
Types of rogue programs include
A. 
B. 
C. 
D. 
23.
Strong passwords should have at least ________ characters.
24.
Adware is a form of spyware that generates annoying pop up and banner ads.
25.
Klea modified Paul's account at the bank so that part of his direct deposit goes into her account. This is an example of data