
cybersecurity vocabulary
Authored by Justin Tijerina
Computers
5th - 6th Grade
CCSS covered
Used 64+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
This cipher uses a key number that indicate how much the letters shift - also a salad!
computer virus
cryptography
caesar
hal
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Designed to protect computer users against deliberate attacks and theft of information.
computer miss-use act
computer virus
cyber crime
encryption
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A small but dangerous piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet.
firewall
computer virus
hacking
malware
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The art of Code writing or breaking
cybercrime
trojan
virus
cryptography
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Any illegal activities committed through the use of computers and the internet.
cybercrime
worm
virus
social engineering
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The stealing of secrets stored in digital formats or on computers and IT networks.
spim
spyware
trojan
cyber espionage
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.
encryption
firewall
analysis
hacking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?