Search Header Logo

Revision -yr 8

Authored by Louise Lockwood

Computers

8th Grade

Used 30+ times

Revision -yr 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of crime in which your private information is stolen and used for criminal activity is called:

Personal identification theft

Phishing

Burglary

Identity Theft

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

scams through websites
scams through emails
scams through phone calls
scams through text messages

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive a suspicious email, you should

open it up and click on any links.
reply to the sender asking them to leave you alone.
delete the email without opening it.
delete your email account.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your password should contain the following:

letters, numbers, symbols

letters only

numbers only

symbols only

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why Should I Care About Copyright?

allows others to copy your work
prevents other people from copying your work 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copying or making slight changes to some or all of someone else's work and saying you created it.

plagarism

copyright

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of law which makes copying images illegal?

The Copyright Act
The Computer Misuse Act
Computer Piracy Act
The Copyright Design and Patents Act

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?