
CyberSecurity Lesson 4
Computers
6th - 8th Grade
CCSS covered
Used 887+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be considered a strong password?
Tags
CCSS.RI.6.7
CCSS.RI.8.7
CCSS.RL.6.7
CCSS.RL.7.7
CCSS.RL.8.7
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a scam?
Tags
CCSS.L.6.6
CCSS.L.7.6
CCSS.L.8.6
CCSS.W.6.2D
CCSS.W.7.2D
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term describes a self-replicating program that damages the normal operation of a computer?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Viruses, worms, and trojans are common security threats that are often used in spreading:
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are creating a new online account. What piece of information that you supply should be strong and hard to break?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While Trish was playing an online game, a pop-up appeared, prompting her to click on the flashing lights to receive more points for her game. What should she do?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?