
Secure Your Secrets Vocabulary
Authored by Pamela Glasener
Computers
7th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting people’s data and personal information (also called sensitive information).
Privacy
Security
Two-step verification
Password
Encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protecting people’s devices and the software on them.
Privacy
Security
Two-step verification
Password
Encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.
Privacy
Security
Two-step verification
Password
Encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwordsx as long and complex as you can while still being able to remember them.
Privacy
Complexity
Two-step verification
Password
Encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of converting information or data into a code that makes it unreadable and inaccessible.
Privacy
Complexity
Two-step verification
Password
Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like $ or &), and both lowercase and uppercase letters.
Privacy
Complexity
Hacker
Password
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.
Privacy
Complexity
Hacker
Password
Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
ICT as Social Change
Quiz
•
12th Grade
10 questions
مراجعة الوحدة 3 ( البرمجة بواسطة المايكروبت )
Quiz
•
12th Grade
10 questions
KRIPTOGRAFI DALAM PENGKOMPUTERAN
Quiz
•
10th - 12th Grade
10 questions
Latihan ICT Part 2
Quiz
•
10th Grade
10 questions
INTERNET AND INTRANET
Quiz
•
9th - 11th Grade
10 questions
ICT Java programming workshop
Quiz
•
9th Grade
10 questions
Year 8 - Unit 2: Small Basic Programming Terminology
Quiz
•
9th Grade
12 questions
website design elements
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade
60 questions
MOS Word Home, Insert, Reference Ribbon Basics
Quiz
•
9th Grade