Computer_ Cyber Crimes

Computer_ Cyber Crimes

10th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Administración de Documentos

Administración de Documentos

11th Grade

25 Qs

Manufacturing Accounts

Manufacturing Accounts

9th - 12th Grade

25 Qs

Commerce

Commerce

11th Grade

25 Qs

Nature and Significance of Management  Quiz-1

Nature and Significance of Management Quiz-1

12th Grade

25 Qs

Operations Review Part 1 (A2 Business)

Operations Review Part 1 (A2 Business)

11th - 12th Grade

26 Qs

Vállalkozó leszek!

Vállalkozó leszek!

9th - 12th Grade

26 Qs

FIVE MAJOR ELEMENTS

FIVE MAJOR ELEMENTS

11th Grade - University

25 Qs

Uso de las comas

Uso de las comas

9th - 12th Grade

25 Qs

Computer_ Cyber Crimes

Computer_ Cyber Crimes

Assessment

Quiz

Business

10th - 12th Grade

Hard

Created by

Carmen James

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

When you catch fish
Code that redirects you to a different website.
A way of tricking people to provide their personal information.
Code that redirects a user to a fake website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

A program that deletes all your files
A program that copies itself
A program that ruins your computer
A program that records everything you type

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a trojan horse?

A virus
A worm
A program that copies itself
Malware that appears safe to trick you into downloading it

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What advice would you give to anyone suspicious of a website?

Check the URL (website address)
Login, and hope for the best
Call your parents

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can protect your files from unauthorised access by:

only allowing your friends and family to know your passwords

making frequent backups

choosing a strong password and changing it regularly

never using computers in a public place such as a library

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?