1 |
Using _______ companies are able to track purchases and gather personal data: |
- A. Data
- B. Infomation
- C. Cookies
- D. Online piracy
|
2 |
Which is the process of encoding data ? |
- A. Service
- B. Online banking
- C. Client
- D. Encryption
|
3 |
Which of the following is not a characteristic of good password ? |
- A. Is eight characters long
- B. Doesn't contain username
- C. Contains uppercase letters
- D. Password is your name only
|
4 |
Which is installing more copies of the software than you have license for ? |
- A. Internet cyber text
- B. Cyber
- C. Client server oversue
- D. Online piracy
|
5 |
Which can protect and idea so that it won't be misuse and the owner will attain its full rights ? |
- A. Hacking
- B. Patent
- C. Identity Theft
- D. Decryption
|
6 |
In Roman Empire _______ method is used this method of encryption for sending messages to his soldiers and generals: |
- A. Service
- B. Online banking
- C. Client
- D. Ceaser
|
7 |
Some software companies sell software with a confidential text, called the: |
- A. Key
- B. Privacy
- C. Software
- D. Phishing
|
8 |
Which means that we want to have access to the data when we want ? |
- A. Patent
- B. Availibility
- C. Client
- D. Software piracy
|
9 |
Vigenere Cipher is another substitution cipher, which uses a table known as: |
- A. Vigenere Cipher table
- B. Simple table
- C. Complex table
- D. Round table
|
10 |
Which is the process of encoding data in such a way that only authorized person can read it ? |
- A. Service
- B. Counterfeiting
- C. Client
- D. Encryption
|