Lesson 4: Protecting your Computer from Security Threats

Lesson 4: Protecting your Computer from Security Threats

6th Grade

24 Qs

quiz-placeholder

Similar activities

Scratch

Scratch

3rd - 6th Grade

20 Qs

Northstar Email

Northstar Email

5th - 12th Grade

25 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Online chat

Online chat

6th Grade

20 Qs

ICT

ICT

5th - 10th Grade

23 Qs

Keyboarding Basics Week 8

Keyboarding Basics Week 8

6th Grade

20 Qs

ICT Computing Essentials Test Prep 4v3

ICT Computing Essentials Test Prep 4v3

6th Grade

25 Qs

mBot Unit 1 Review

mBot Unit 1 Review

4th - 8th Grade

20 Qs

Lesson 4: Protecting your Computer from Security Threats

Lesson 4: Protecting your Computer from Security Threats

Assessment

Quiz

Instructional Technology

6th Grade

Medium

Created by

Megan Doxzon

Used 71+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be considered a strong password?

Kim12345

mydogSpot

JLP17#butterflies

joesmithpelicanmiddleschool

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What

does the lock represent?

A link to open another site.

A webpage that has a secure connection.

A program that prevents you from leaving the page

A warning that you are not allowed to view this webpage.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a scam?

A friend sends you an e-mail asking to borrow some money

Your brother sends you a text message on your mobile device

A pop-up appears in your online game urging you to click the image.

Your teacher sends you an e-mail message with the homework assignment.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a self-replicating program that damages the normal operation of a computer?

Worm

Phishing

Virus

Plagiarism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Viruses, worms and trojans are common security threats that are often used in spreading:

scams

malware

downloads

passwords

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are creating a new online account. What piece of information that you supply should be strong

and hard to break?

A password

A user name

An e-mail address

A picture of yourself

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While Trish was playing an online game, a pop-up appeared, prompting her to click on the flashing

lights to receive more points for her game. What should she do?

Click on the flashing lights.

Turn off the game and the gaming console.

Click the X in the corner of the pop-up to make it go away.

Save the pop-up message until she really needs extra points to win.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?