Search Header Logo

E-Safety

Authored by Judy Te

Instructional Technology

11th Grade

Used 30+ times

E-Safety
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term does not belong to the group below?

Rootkit

Ransomware

Adware

Firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term does not belong to the group below?

Norton

Trojan Horse

Kaspersky

McAfee

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Please tick the term(s) below for some validation process.

encode username and password

anti-virus

facial recognition

eye and retina

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The term referred to as ________ when a software or document went through validation and verification.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Which term is referred to as __________when a password of a victim has been cracked and unauthorized user gain access to a person's account and confidential files?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the term below does not belong to the group?

Pharming

Phishing

Vishing

Spyware

None

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick the term(s) below that help you protect your computer and account from unauthorized access or malware.

Proxy Server

Firewall

Anti-virus

Ransomware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology