Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
Which of the following should you use when you want to test connectivity between your computer and a destination computer?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
Question 37 :The Right to be Forgotten debate revolves around what?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
What is ciphertext?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
What is a worm?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
What is an update?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
Why should you use automatic cookie handling in most browsers?
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
Because spam is sent to you uninvited, it can be considered:
The ping command
key
Protecting your image and personal information in the world of social networking
To broadly control when and from whom cookies are accepted
A self-replicating program or algorithm that consumes system resources
Encrypted data
A file or collection of software tools that resolves system liabilities and improves software performance
an invasion of privacy.
Check it!