cybersecurity vocabulary

cybersecurity vocabulary

5th - 6th Grade

30 Qs

quiz-placeholder

Similar activities

Information Technology Jobs

Information Technology Jobs

6th - 8th Grade

25 Qs

TYPES OF COMPUTERS-YEAR 6

TYPES OF COMPUTERS-YEAR 6

1st - 5th Grade

25 Qs

MAWD 1.01 B

MAWD 1.01 B

KG - University

28 Qs

Examen trimestral de Informatica 6to Grado

Examen trimestral de Informatica 6to Grado

6th Grade

27 Qs

For Loops Code.org/ Lessons 6-10 (Flocabulary)

For Loops Code.org/ Lessons 6-10 (Flocabulary)

6th - 8th Grade

25 Qs

Module 2

Module 2

6th - 8th Grade

25 Qs

ICT HBL Week 43

ICT HBL Week 43

5th - 6th Grade

25 Qs

Đề 3

Đề 3

6th - 8th Grade

25 Qs

cybersecurity vocabulary

cybersecurity vocabulary

Assessment

Quiz

Computers

5th - 6th Grade

Practice Problem

Medium

CCSS
L.1.6, RI.11-12.9, RL.2.6

+18

Standards-aligned

Created by

Justin Tijerina

Used 64+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

This cipher uses a key number that indicate how much the letters shift - also a salad!

computer virus

cryptography

caesar

hal

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Designed to protect computer users against deliberate attacks and theft of information.

computer miss-use act

computer virus

cyber crime

encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A small but dangerous piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet.

firewall

computer virus

hacking

malware

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The art of Code writing or breaking

cybercrime

trojan

virus

cryptography

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Any illegal activities committed through the use of computers and the internet.

cybercrime

worm

virus

social engineering

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The stealing of secrets stored in digital formats or on computers and IT networks.

spim

spyware

trojan

cyber espionage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.

encryption

firewall

analysis

hacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?