I.T Cyber Ethics

I.T Cyber Ethics

9th - 10th Grade

7 Qs

quiz-placeholder

Similar activities

social engineering

social engineering

1st Grade - Professional Development

10 Qs

OFIMÁTICA VERANO 5

OFIMÁTICA VERANO 5

1st - 12th Grade

10 Qs

Engineering Journals and Proof of Concept Prototype

Engineering Journals and Proof of Concept Prototype

9th - 12th Grade

8 Qs

Quizz Internet

Quizz Internet

KG - Professional Development

12 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

Parcial 1, Primera serie

Parcial 1, Primera serie

6th Grade - University

10 Qs

Networks and Internet

Networks and Internet

10th Grade

10 Qs

Spreadsheet Starter

Spreadsheet Starter

7th Grade - University

12 Qs

I.T Cyber Ethics

I.T Cyber Ethics

Assessment

Quiz

Computers

9th - 10th Grade

Practice Problem

Medium

Created by

HogriderHorse HogriderHorse

Used 386+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Netiqutte For New Users are known as:

Professional

Newbies

Starters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

It is a type of fraud that involves using someone else's identity to steal money or gain other benefits

This type of fraud involves three parties the fraudster, the unsuspecting legitimate shopper and the ecommerce store.

It is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Ethics is a set of __________ Principles that govern the behaviour of a group or Individual.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the Following is NOT rules that users must Follow while in Online:

Do NOT shout

Do not consult FAQ'S

Be Careful With jokes

Avoid Flaming

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Encrypt the Code:"EADGT GVJKEU"

Rules

All the Correct letters are 2 letter Backwards

Eg: C it will Be A

Cyber Ethers

Cyber Fraud

Cyber Control

Cyber Ethics

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What Is Algorithm

The conversion of encrypted data into its original form

It is the method by which information is converted into secret code that hides the information's true meaning

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A _________________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

Digital Signature

Encryption

Digital certificate

Decryption