Search Header Logo

Chapter 7

Authored by Peter McDaid

Computers

Professional Development

Used 11+ times

Chapter 7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?