I.T Cyber Ethics

I.T Cyber Ethics

9th - 10th Grade

7 Qs

quiz-placeholder

Similar activities

Паскаль. Основные команды

Паскаль. Основные команды

8th - 11th Grade

10 Qs

Sistem Mikrowave TJKT

Sistem Mikrowave TJKT

10th Grade

10 Qs

Word 2016

Word 2016

10th Grade

10 Qs

C# lesson10

C# lesson10

1st - 10th Grade

10 Qs

11º Quiz-1 Mantenimiento de un PC

11º Quiz-1 Mantenimiento de un PC

9th Grade

10 Qs

QUIZ DE TECNOLOGÍA E INFORMÁTICA CICLO V (periodo 3)

QUIZ DE TECNOLOGÍA E INFORMÁTICA CICLO V (periodo 3)

1st - 12th Grade

10 Qs

Componentes de la Computadora

Componentes de la Computadora

10th Grade

10 Qs

Konsep Routing

Konsep Routing

1st - 10th Grade

10 Qs

I.T Cyber Ethics

I.T Cyber Ethics

Assessment

Quiz

Computers

9th - 10th Grade

Practice Problem

Medium

Created by

HogriderHorse HogriderHorse

Used 386+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Netiqutte For New Users are known as:

Professional

Newbies

Starters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

It is a type of fraud that involves using someone else's identity to steal money or gain other benefits

This type of fraud involves three parties the fraudster, the unsuspecting legitimate shopper and the ecommerce store.

It is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Ethics is a set of __________ Principles that govern the behaviour of a group or Individual.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the Following is NOT rules that users must Follow while in Online:

Do NOT shout

Do not consult FAQ'S

Be Careful With jokes

Avoid Flaming

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Encrypt the Code:"EADGT GVJKEU"

Rules

All the Correct letters are 2 letter Backwards

Eg: C it will Be A

Cyber Ethers

Cyber Fraud

Cyber Control

Cyber Ethics

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What Is Algorithm

The conversion of encrypted data into its original form

It is the method by which information is converted into secret code that hides the information's true meaning

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A _________________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

Digital Signature

Encryption

Digital certificate

Decryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?