
cyber law
Authored by taylor grace
Computers, Business
9th - 12th Grade
Used 95+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Creating a false identity or using someone else's to commit fraud
Cyberpiracy
Cyber proofing
cyber blackmail
cyber germ warfare
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
using a computer to steal digital data
Cyber proofing
Cyberpiracy
Cyber blackmail
cyber germ warfare
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Using information obtained by computer to blackmail someone
Cyber proofing
Cyberpiracy
cyber blackmail
Cyber germ warfare
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
transmitting computer viruses to people to destroy their files
cyber proofing
Cyberpiracy
cyber blackmail
Cyber germ warfare
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
using a computer to steal someone's information
Identity theft
phishing
cyber terrorism
cyber vandalism
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
sending emails pretending to be a company to get information from people (like passwords)
identity theft
phishing
cyber terrorism
Cyber vandalism
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
operating a computer to disrupt the national electronic infrastructure
identity theft
phishing
cyber terrorism
cyber vandalism
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?