Search Header Logo

Secure Your Secrets Vocabulary

Authored by Pamela Glasener

Computers

7th - 12th Grade

Used 4+ times

Secure Your Secrets Vocabulary
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protecting people’s data and personal information (also called sensitive information).

Privacy

Security

Two-step verification

Password

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protecting people’s devices and the software on them.

Privacy

Security

Two-step verification

Password

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.

Privacy

Security

Two-step verification

Password

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwordsx as long and complex as you can while still being able to remember them.

Privacy

Complexity

Two-step verification

Password

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting information or data into a code that makes it unreadable and inaccessible.

Privacy

Complexity

Two-step verification

Password

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like $ or &), and both lowercase and uppercase letters.

Privacy

Complexity

Hacker

Password

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.

Privacy

Complexity

Hacker

Password

Encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?