1) It refers to a person who has the knowledge and skills to effectively use digital technologies to communicate with others. a) Digital Citizenship b) VPN c) Digital Footprint d) Privacy e) Security f) Database 2) It is data that is left behind when users have been online. a) Password b) Username c) Cookies d) Digital Footprint e) Avatar f) Hacker 3) It is a crime in which an attacker uses fraud or deception to obtain personal information and misuses it to act in the victim's name. a) Digital Citizenship b) Data c) Privacy d) Security e) Identity Theft f) Password 4) It is an individual who uses computer, networking or other skills to overcome a technical problem a) Online Scam b) Hacker c) Database d) Privacy e) Security  f) Digital Footprint  5) It is a document that explains how an organization handles any customer, client or employee information gathered in its operations. a) Password b) VPN c) Privacy Policy d) Hacker e) Digital Citizenship f) Identity Theft 6) It is an internet fraud. a) Online Scam b) Digital Footprint  c) Privacy d) Security  e) Username f) Avatar 7) It is an organized collection of structured information, or data, typically stored electronically in a computer system a) Cookies b) Digital Citizenship c) Hacker d) Online Scam e) Database f) VPN 8) It protects confidentiality, integrity and availability of information a) Password b) Security c) Avatar d) VPN e) Identity Theft f) Username 9) It is a string of characters used to verify the identity of a user during the authentication process. a) Username b) Online Scam c) Digital Footprint d) Digital Citizenship e) Privacy f) Password 10) It is an identification used by a person with access to a computer, network, or online service. a) Password b) Identity Theft c) Username d) Online Scam e) Privacy f) Security 11) It has been defined as the selective control of information sharing. a) Digital Footprint b) Hacker  c) Database d) VPN e) Cookies f) Digital Citizenship 12) They are text files with small pieces of data like a username and password that are used to identify your computer as you use a computer network. a) Avatar b) Cookies c) Username d) Privacy e) Password f) Security 13) It is the image displayed next to your handle in social network. a) Avatar b) Digital Footprint c) Hacker d) Online Scam e) Identity Theft f) Privacy 14) It hides your online activity a) Hacker b) Digital Citizenship c) Database d) VPN e) Privacy Policy f) Username

Classement

Style visuel

Options

Changer de modèle

Restauration auto-sauvegardé :  ?