I.T Cyber Ethics

I.T Cyber Ethics

9th - 10th Grade

7 Qs

quiz-placeholder

Similar activities

Quis kelas 10

Quis kelas 10

10th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

Digital Literacy and Digital Divide Quiz

Digital Literacy and Digital Divide Quiz

9th Grade

10 Qs

Societal impact 3

Societal impact 3

10th - 12th Grade

8 Qs

Quiz Revolusi Industri 4.0

Quiz Revolusi Industri 4.0

10th Grade

10 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

10 Qs

Cyber Security Quiz

Cyber Security Quiz

10th Grade

7 Qs

Studio - U3 - LO2-2.2 Types of Attackers

Studio - U3 - LO2-2.2 Types of Attackers

9th Grade

10 Qs

I.T Cyber Ethics

I.T Cyber Ethics

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

HogriderHorse HogriderHorse

Used 384+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Netiqutte For New Users are known as:

Professional

Newbies

Starters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

It is a type of fraud that involves using someone else's identity to steal money or gain other benefits

This type of fraud involves three parties the fraudster, the unsuspecting legitimate shopper and the ecommerce store.

It is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Ethics is a set of __________ Principles that govern the behaviour of a group or Individual.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the Following is NOT rules that users must Follow while in Online:

Do NOT shout

Do not consult FAQ'S

Be Careful With jokes

Avoid Flaming

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Encrypt the Code:"EADGT GVJKEU"

Rules

All the Correct letters are 2 letter Backwards

Eg: C it will Be A

Cyber Ethers

Cyber Fraud

Cyber Control

Cyber Ethics

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What Is Algorithm

The conversion of encrypted data into its original form

It is the method by which information is converted into secret code that hides the information's true meaning

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A _________________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

Digital Signature

Encryption

Digital certificate

Decryption