
Chapter 7
Authored by Peter McDaid
Computers
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?
3.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malicious software that is unintentionally downloaded onto a computer by a user is called?
Hacking
Spyware
Malware
Phishing
5.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc
Key Logger
Trojan Horse
Work
Virus
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
This malware spreads around a computer system by replicating itself.
Trojan Horse
Worm
Spyware
Key Logger
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?