What is the process that is used to verify a user with a login and password?

The name of the small data file stored on your computer from a web site?

What is the name of the long complex string of characters used to track your purchases, likes, dislikes, etc.?

What is the type of computer threat named for a historical war gift/trick?

GPS data attached to photos on a device may allow people to identify your location. This is called

The type of threat that may be on your device, now, that can track the keys you press is called __________?

The type of threat where your data is encrypted and you need to pay money to have it released is called _______________?

The type of hacker that engages in ethical hacking to help businesses and organizations is called a ___________________?

Which of the following is an example of a safe password?

A computer threat that copies and spreads, is more serious than a virus, and does not need human assistance is called a

Teachers: Create FREE classroom games with your questions Click for more info!
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map