Search Header Logo

Week 2 (Pre-Test) Empowerment Technology

Authored by Marc City

Instructional Technology

11th - 12th Grade

5 Questions

Used 68+ times

Week 2 (Pre-Test) Empowerment Technology
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of file does key logger software typically use to store its recording?

Data Files

Virus Files

Text Files

Log Files

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Raffy is using a technique that tries to take information from the user. He commonly takes things like credit cards, usernames, passwords, and home address. What type of threat is depicted in the scenario?

Fishing

Scam

Spam

Phishing

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How does spyware infect a computer?

Popups

Theft of personal information

Recording web information

All of the above

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

People who practice identity theft usually go for

Personal information

Being able to have another name

Send users an email

Victim’s Address

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The following are tips on how to stay safe online except

Add friends you know in real life

Avoid visiting untrusted websites.

Share your password with anyone

Buy the software, do not use pirated ones.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?