
Ict/cyberterrorism
Authored by Danae Rollon
Computers
KG - Professional Development
Used 26+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What is cyberterrorism?
the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
The terrorism of cyber platforms.
This is when terrorist like hackers attack online platforms for political and bad reasons etc.
The consistency of hackers combined to for an elite romp of cyber attackers.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the different types of hackers?
White hat hacker
Blue hat hacker
Grey hat hacker
Black hat hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between white, grey, and black hat hackers!?
The colors are different.
The white hat hacker is a good hacker who helps the government/company to spot a hack alert, a grey hat hack is good and bad and more than likely works for anyone once they are paid. Finally a black hat hacker is one in which hacks for personal uses and uses hacking at a bad extent.
I don’t know.
The hackers are different because they have different uses.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cyber warfare?
The use of technology to create An online war for a software platform etc.
War on cyber Platforms
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
I don’t know
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of these passwords can be used help protect you from cyber terrorist?
Ru^^?ers@d
Rumpersad1
Password100
R-mP€R$@D00182
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are is the difference between “cyber warfare” and; “cyber terrorism”?
They are the same but there are different names to call it.
They are for two separate purpose.
They are techniques used by different types of organizations, people, etc.
cyber warfare have “certain targets” in a war but cyber terrorism causes fear and harm to anyone in the targeted vicinity.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which Devices are usually hacked by terrorist?
Phones
Computer
iPads
All of the above!
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CP N4 - Module 8
Quiz
•
KG
10 questions
Have fun 1 chút với CyberSchool nhé !
Quiz
•
University
11 questions
Catena di Montaggio SW
Quiz
•
1st Grade
11 questions
1.5 System Software
Quiz
•
11th Grade
10 questions
Quiz Revolusi Industri 4.0
Quiz
•
10th Grade
10 questions
Scratch Básico
Quiz
•
KG
10 questions
Computer Grundlagen Quiz
Quiz
•
Professional Development
11 questions
Snap! Basics
Quiz
•
7th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade