Computer Crime End of unit Assessment SPA

Computer Crime End of unit Assessment SPA

6th - 8th Grade

40 Qs

quiz-placeholder

Similar activities

ADOBE FLASH CS6

ADOBE FLASH CS6

6th - 7th Grade

35 Qs

TIK kelas 7, Penilaian Tengah semester

TIK kelas 7, Penilaian Tengah semester

7th Grade - University

40 Qs

he

he

8th - 10th Grade

38 Qs

latihan UTS kelas 8

latihan UTS kelas 8

8th Grade

40 Qs

Computing Fundamentals Pt 2

Computing Fundamentals Pt 2

6th - 8th Grade

35 Qs

DBI

DBI

7th - 8th Grade

40 Qs

TIN 8 KT CUỐI HK I 23-24

TIN 8 KT CUỐI HK I 23-24

8th Grade

40 Qs

SISTEM KOMPUTER KELAS 7

SISTEM KOMPUTER KELAS 7

7th Grade

35 Qs

Computer Crime End of unit Assessment SPA

Computer Crime End of unit Assessment SPA

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Lee Woodhouse

Used 41+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A fraudulent email which is trying to obtain your username and password for a particular site will typically:

have a heading with a logo which appears genuine

address you by name

offer large sums of money

appear to come from a friend

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

pointing to the link without clicking

deleting the email

replying to the email

clicking on the link

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacking is illegal under:

The Data Protection Act or GDPR

The Computer Misuse Act

Copyright Law

Health and Safety Law

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email

delete the email

send some money

forward the email to a mutual friend

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers