Chapter 7

Chapter 7

Professional Development

20 Qs

quiz-placeholder

Similar activities

Web Dev Quiz-1

Web Dev Quiz-1

Professional Development

20 Qs

ZTE Phone Quiz

ZTE Phone Quiz

1st Grade - Professional Development

17 Qs

PRE TEST (B) - Product Link & TELEMATICS

PRE TEST (B) - Product Link & TELEMATICS

University - Professional Development

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

C programming_Shivank

C programming_Shivank

Professional Development

20 Qs

Family Quizz

Family Quizz

5th Grade - Professional Development

15 Qs

Comunicación Visual

Comunicación Visual

University - Professional Development

20 Qs

Python

Python

Professional Development

20 Qs

Chapter 7

Chapter 7

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Peter McDaid

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?