
Week 2 (Pre-Test) Empowerment Technology
Authored by Marc City
Instructional Technology
11th - 12th Grade
Used 68+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What type of file does key logger software typically use to store its recording?
Data Files
Virus Files
Text Files
Log Files
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Raffy is using a technique that tries to take information from the user. He commonly takes things like credit cards, usernames, passwords, and home address. What type of threat is depicted in the scenario?
Fishing
Scam
Spam
Phishing
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How does spyware infect a computer?
Popups
Theft of personal information
Recording web information
All of the above
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
People who practice identity theft usually go for
Personal information
Being able to have another name
Send users an email
Victim’s Address
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The following are tips on how to stay safe online except
Add friends you know in real life
Avoid visiting untrusted websites.
Share your password with anyone
Buy the software, do not use pirated ones.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?