<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml"
        xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    
    <url>
        <loc>https://www.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack</loc>
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/mh-grade-10-science/xf0d64b81b0b74ee4:social-health/xf0d64b81b0b74ee4:cyber-security/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/v/phishing-attack" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/college-careers-more/an-toan-internet/x8182d33f1114b84c:an-toan-internet/x8182d33f1114b84c:tim-hieu-nhan-biet-va-phong-tranh-lua-dao-tren-khong-gian-mang/v/phishing-attack" />
        
        <lastmod>2023-04-18T21:42:29.768102862Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="phishing-attack">
            <Attribute name="title">Phishing attacks</Attribute>
            <Attribute name="description">In a phishing attack, scammers send emails or texts pretending to be from a trusted source, like PayPal or Amazon. They use urgent language to scare you into clicking links and providing your login information. To avoid falling for these scams, always verify email addresses and URLs before taking any action. Stay skeptical and cautious when dealing with suspicious messages.</Attribute>
            <Attribute name="author">Sal Khan</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>Phishing attacks</video:title>
            <video:description>In a phishing attack, scammers send emails or texts pretending to be from a trusted source, like PayPal or Amazon. They use urgent language to scare you into clicking links and providing your login information. To avoid falling for these scams, always verify email addresses and URLs before taking any action. Stay skeptical and cautious when dealing with suspicious messages.</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/83VKm3aLq3I.mp4/83VKm3aLq3I.mp4</video:player_loc>
            <video:duration>284</video:duration>
            <video:category>Software and internet security ethics</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="cs"
                    href="https://cs.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/mh-grade-10-science/xf0d64b81b0b74ee4:social-health/xf0d64b81b0b74ee4:cyber-security/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/code-org/computers-and-the-internet/internet-works/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="tr"
                    href="https://tr.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/v/the-internet-cybersecurity-and-crime" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/college-careers-more/an-toan-internet/x8182d33f1114b84c:an-toan-internet/x8182d33f1114b84c:tim-hieu-nhan-biet-va-phong-tranh-lua-dao-tren-khong-gian-mang/v/the-internet-cybersecurity-and-crime" />
        
        <lastmod>2021-03-22T14:52:39Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="the-internet-cybersecurity-and-crime">
            <Attribute name="title">Cybersecurity and crime</Attribute>
            <Attribute name="description">Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams. </Attribute>
            
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>Cybersecurity and crime</video:title>
            <video:description>Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams. </video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/5k24We8pED8.mp4/5k24We8pED8.mp4</video:player_loc>
            <video:duration>302</video:duration>
            <video:category>Software and internet security ethics</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/maharashtra-board-preparation-class-10in/xba381aded23053de:week-3/xba381aded23053de:social-health-disaster-management-and-space-missions/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/e/phishing-attacks" />
        
        <lastmod>2024-07-15T03:55:09.600941203Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="phishing-attacks">
            <Attribute name="title">Phishing attacks</Attribute>
            <Attribute name="description">Check your understanding of phishing attacks in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="mr"
                    href="https://mr.khanacademy.org/science/mh-grade-10-science/xf0d64b81b0b74ee4:social-health/xf0d64b81b0b74ee4:cyber-security/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/a/phishing-attacks" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/a/phishing-attacks" />
        
        <lastmod>2024-06-03T03:33:24.453729583Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="phishing-attacks">
            <Attribute name="title">Phishing attacks</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/a/rogue-access-points-mitm-attacks" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks" />
        
        <lastmod>2021-04-29T07:57:14Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="rogue-access-points-mitm-attacks">
            <Attribute name="title">Rogue access points</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/rogue-access-points" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/e/rogue-access-points" />
        
        <lastmod>2023-05-01T01:52:26.971064259Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="rogue-access-points">
            <Attribute name="title">Rogue access points</Attribute>
            <Attribute name="description">Check your understanding of how rogue access points can intercept data in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/siguranta-pe-internet/x2a306cf2144cb3b3:siguranta-datelor-online/x2a306cf2144cb3b3:cyber-attacks/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/a/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/computer-malware" />
        
        <lastmod>2021-04-29T07:48:34Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="computer-malware">
            <Attribute name="title">Computer malware</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:cyber-attacks/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:tan-cong-mang-may-tinh-va-internet/e/computer-malware" />
        
        <xhtml:link rel="alternate" hreflang="zh-hans"
                    href="https://zh.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/e/computer-malware" />
        
        <lastmod>2021-04-29T07:52:15Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="computer-malware">
            <Attribute name="title">Computer malware</Attribute>
            <Attribute name="description">Check your understanding of computer malware, computer viruses, and keylogging in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
</urlset>
