Buscar
🇪🇸
MEM
O
RY
.COM
4.37.48
Invitado
Iniciar sesión
Página de inicio
0
0
0
0
0
Crear curso
Cursos
Último juego
Panel
Notificaciones
Clases
Carpetas
Exámenes
Exámenes personalizados
Ayuda
Marcador
Tienda
Premios
Amigos
Asignaturas
Modo oscuro
Identificador de usuario: 999999
Versión: 4.37.48
www.memory.es
Estás en modo de exploración. debe iniciar sesión para usar
MEM
O
RY
Inicia sesión para empezar
Index
»
Computer science
»
Issues
»
Basic Issues
level: Basic Issues
Questions and Answers List
level questions: Basic Issues
Question
Answer
If someone uses social media to deliberately harm others is called?
Cyberbullying
Creating public arguments with people online and commenting in a way that frustrates them is called
Trolling
In countries like China, many foreign websites are banned. Such an act can be termed as
Internet censorship
The act of monitoring what other people are doing on computer or internet is called
Computer surveillance
An illegal activity that involves computer or internet is called
Cyber Crime
Flooding a network by sending useless traffic from multiple sources to a target system can be called as
Distributed Denial of Service (DDos) Attack
The method of cracking passwords using trial and error or using an automated software can be termed as
Brute force attack
Software that is freely available on the internet and is allowed to modify its source code can be called as
Open Source Software
Illegal copying of software is called as
Software Piracy (Copyright Infringement)
What is DRM in the context of copyright?
Digital Rights Management
The web browser Mozilla Firefox would fall under what kind of software:Open Source or Copyrighted?
Open Source
What is DMCA in the context of copyright?
Digital Millennium Copyright Act
What is GDPR stands for in the context of data protection?
General Data Protection Regulation
Gaining access to a system by exploiting the weakness in the system security can be called as
Hacking
An electronic device sets for discarding/recycling/reusing can be termed as
E-Waste
Is it advisable to supply credit card details on an e-commerce website without SSL?
No
A program or file intentionally designed to harm a computer or network is called
Malware
The act of capturing data packets flowing across a network is called
Packet Sniffing
The act of modifying a copyrighted software in a way that affects its copy protection feature is called
Software Cracking
Is it a good practice to read privacy agreement before using a software or visiting a website?
Yes