COMPLETE STUDY GUIDE; ACTUAL 100+ ACCURATE
QUIZZES WITH DETAILED, VERIFIED ANSWERS; A
GRADE; 2025
Report abuse quickly - ANS-First step to take when being cyberbullied or cyberstalked
Components of an online profile - ANS-Details about an individual that are combined from online and
offline behaviors, including comments, postings, likes and shares, and online coupons
Identity theft - ANS-The nation's fastest growing crime, where victims are unaware it's being committed
until the damage is done
Driver's license, birth certificate - ANS-Items an identity thief van obtain to impersonate you
Netiquette - ANS-A set of online communication practices and rules
Relieves eye and neck strain - ANS-Having eyes even with the top third of a monitor
Causes of RSIs - ANS-Swiping, tapping, or pinching a tablet, or clicking and dragging a mouse repititively
Signs of Internet addiction - ANS-Excessive use of gaming, video, research and surfing,
texting,blogging,social networking, and shopping coupled with the inability to stop
App that reminds you to take a break - ANS-A way to relieve overall stress on body and break up
workflow
Causes of headaches and eye strain - ANS-Straining to read at an awkward angle or viewing a screen for
too long
electronic wallet - ANS-One secure method of online payment
misspelled company name - ANS-Indication that a Web site is not secure
, money transfer - ANS-Online payment method to avoid
https:// - ANS-Indication that a Web site is secure for Shopping
phishing - ANS-E-mails that might appear to come from your bank or credit card company, asking you for
e-mail logon or personal information
Energy star sticker (picture) - ANS-Indication that a product was built energy-efficient standards
Donate (picture) - ANS-Do this with devices you don't want, rather that discarding them
Piled up electronics (picture) - ANS-Electronic trash is often shipped overseas
e-Stewards computer (picture) - ANS-Certification a company or recycling business can receive from the
international non-profit environmental group, Basel Action
black computer with pictures (picture) - ANS-Devices that become e-waste
hurricanes and storms - ANS-Events that account for almost half of total catastrophic data losses
cyberterrorism - ANS-Using automated attack tools like viruses and worms to deliberately disrupt
computers and networks to affect the most people
uninterruptible - ANS-Type of power supply/battery backup device that can prevent some forms of data
loss
White Hat - ANS-Type of hacker who wants to show off their skills and doesn't intend any serious
damage
Black Hat - ANS-Type of hacker who intends serious harm through espionage, theft, or disruption of a
network
VPN - ANS-A private secure path across a public network (usually the internet)
peer-to-peer - ANS-A network where each computer is equal to others and maintains its own operating
system and application software
client server - ANS-Network architecture in which one or more high-powered computers provide
resources or services to other computers on the network
intranet - ANS-A private corporate network for use by employees to coordinate e-mail and
communications
extranet - ANS-Type of network that allows an organization to permit outsiders, like customers to access
part of its network
PAN - ANS-Bluetooth is a technology often used in this type of network