ANSWERS!!
Data mining (def.) correct answers Automatically searching large data sets to find patterns,
trends, or relationships.
Secondary use of information def and example correct answers Using data for a purpose different
from the one for which it was originally collected.Ex: Store uses loyalty-card data (collected for
discounts) to sell to advertisers.
Collaborative filtering, def, example, and method correct answers Using ratings/behavior of
many users to predict what another user will like.Methods/examples: "People who bought X also
bought Y," movie-recommendation lists, Spotify/Netflix suggestions based on similar users.
Data mining (govt. context) def and example correct answers Government scanning huge
databases (phone records, travel logs, etc.) to find suspicious patterns suggesting terrorism or
crime.Example: Searching airline and credit-card data to identify possible terrorists.
Hacking, Five ways to obtain logins/passwords correct answers 1.Guessing / dictionary or brute-
force attacks
2. Shoulder surfing (watching someone type)
3. Searching written notes or files for passwords
4.Phishing / fake login pages or emails
5. Installing keyloggers or other malware to capture keystrokes
Sidejacking (def./example) correct answers Stealing session cookies from unencrypted Wi-Fi
traffic and using them to hijack someone's logged-in web session (e.g., taking over their social-
media account).
Virus (def./example) correct answers Malicious program that attaches to other programs or files
and spreads when they run.Example: Macro virus in Word documents that infects each file
opened.
Worm (def./example) correct answers Self-replicating program that spreads over networks
without attaching to other files.Example: Email or internet worm that scans and infects other
machines automatically.
Trojan Horse (def./example) correct answers Unauthorized access to a computer or network,
often by exploiting a vulnerability.Example: Breaking into a company server to steal customer
data.