cybersecurity vocabulary

cybersecurity vocabulary

5th - 6th Grade

30 Qs

quiz-placeholder

Similar activities

2020 Dönem Sonu

2020 Dönem Sonu

5th - 6th Grade

25 Qs

Chapter 2 assessment Computer Science

Chapter 2 assessment Computer Science

6th - 9th Grade

25 Qs

COMPUTING YEAR 5

COMPUTING YEAR 5

5th Grade

25 Qs

Artificial Intelligence  and Robotics Quiz

Artificial Intelligence and Robotics Quiz

6th - 8th Grade

25 Qs

cisco

cisco

6th - 8th Grade

25 Qs

Computer an Overview (Revision-2)

Computer an Overview (Revision-2)

5th - 7th Grade

25 Qs

EMPOWERMENT TECHNOLOGY

EMPOWERMENT TECHNOLOGY

KG - University

25 Qs

98-365 Study Guide P.5

98-365 Study Guide P.5

KG - Professional Development

25 Qs

cybersecurity vocabulary

cybersecurity vocabulary

Assessment

Quiz

Computers

5th - 6th Grade

Practice Problem

Medium

CCSS
L.1.6, RI.9-10.9, RL.2.6

+18

Standards-aligned

Created by

Justin Tijerina

Used 64+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

This cipher uses a key number that indicate how much the letters shift - also a salad!

computer virus

cryptography

caesar

hal

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Designed to protect computer users against deliberate attacks and theft of information.

computer miss-use act

computer virus

cyber crime

encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A small but dangerous piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet.

firewall

computer virus

hacking

malware

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The art of Code writing or breaking

cybercrime

trojan

virus

cryptography

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Any illegal activities committed through the use of computers and the internet.

cybercrime

worm

virus

social engineering

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The stealing of secrets stored in digital formats or on computers and IT networks.

spim

spyware

trojan

cyber espionage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.

encryption

firewall

analysis

hacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?