Technology in Action, 9e Chapter 9 Buzzwords

Technology in Action, 9e Chapter 9 Buzzwords

Gap-fill exercise

Fill in all the gaps, then press "Check" to check your answers. Use the "Hint" button to get a free letter if an answer is giving you trouble. You can also click on the "[?]" button to get a clue. Note that you will lose points if you ask for hints or clues!
adwareantivirus softwarebotnet
encryptionfirewallhacker(s)
identity theftimage backup(s)incremental backup(s)
logical port(s)phishingsocial engineering
social networkingspywaresurge protector
zombie(s)


Instructions: Fill in the blanks using the words from the Word Bank above.

Randy learned a lot about data security when a data breach occurred on an online gaming site on which he had personal information stored. He was the victim of various (1) attacks including a phone call from a thief pretending to be from his bank. He received quite a few (2) e-mails from (3) that tried to get him to reveal his ATM password at sites that looked very similar to his online bank’s real Website. He wondered if this data breach had anything to do with the rash of pop-ups on his computer displaying various types of (4) pushing useless products he had no interest in buying. When he installed new (5) to check his computer for malware problems, the software informed him that his computer was infected with many types of (6) that were recording information about where he was surfing on the Internet. He sure hoped none of these problems would lead to a hacker using his information to commit (7) and clean out his bank account.

Randy figured he better ensure his network security was up to date. He checked his (8) software that came with Windows 7 to ensure it was appropriately configured to close off his computer’s (9) to keep hackers at bay. Randy was cautious since his friend Stanley’s computer was turned into a (10) by a hacker as part of a much larger (11) that was used to launch a distributed denial of service attack on major Internet retailers.