Computer Crime and Cyber Security

Computer Crime and Cyber Security

8th - 9th Grade

30 Qs

quiz-placeholder

Similar activities

Year 9 Spring review

Year 9 Spring review

9th Grade

26 Qs

Understanding Computers

Understanding Computers

8th Grade

25 Qs

ICT Communications Essentials - Lesson 1 and 2 Mrs. Gracia Class

ICT Communications Essentials - Lesson 1 and 2 Mrs. Gracia Class

6th - 8th Grade

25 Qs

KS3 Understranding Computers

KS3 Understranding Computers

8th Grade

25 Qs

Computer Grade 8 (quiz 1)

Computer Grade 8 (quiz 1)

7th - 10th Grade

25 Qs

Computer Academic Vocabulary

Computer Academic Vocabulary

6th - 8th Grade

26 Qs

Computer Systems and Computer Ethics

Computer Systems and Computer Ethics

8th - 12th Grade

25 Qs

Networks and the Internet

Networks and the Internet

9th - 12th Grade

25 Qs

Computer Crime and Cyber Security

Computer Crime and Cyber Security

Assessment

Quiz

8th - 9th Grade

Hard

CCSS
RL.9-10.9, RL.5.1, RL.4.1

+1

Standards-aligned

Created by

C Turner

Used 363+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

pointing to the link or hovering over it without clicking

deleting the email

replying to the email

clicking on the link

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal under:

The Data Protection Act

The Computer Misuse Act

Copyright Law

Health and Safety Law

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can protect your files from unauthorised access by:

only allowing your friends and family to know your passwords

making frequent backups

choosing a strong password and changing it regularly

never using computers in a public place such as a library

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer virus is a small program which:

will destroy your computer hardware

you may unintentionally transmit to other computers and infect them

can only be transmitted via email

cannot be removed from your computer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?