Term
All of the following are examples of real security and privacy risks EXCEPT: a) hackers b) viruses c) spam d) identity theft |
|
Definition
|
|
Term
Unwanted electronic e-mail is called: a) spam b) spyware c) adware d) software |
|
Definition
|
|
Term
A process known as _____ is used by some realtailers to study trends a) data mining b) data selection c) adware d) data conversation |
|
Definition
|
|
Term
Which of the following is NOT necessarily part of being computer literate? a) avoiding hackers and viruses b) protecting your privacy c) being able to build a computer d) using the Internet wisely |
|
Definition
being able to build a computer |
|
|
Term
_____ is the set of techniques used in information handling and retrieval. a) Computer Forensics b) Database mining c) RFID d) Information technology |
|
Definition
|
|