
E-Safety
Authored by Judy Te
Instructional Technology
11th Grade
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term does not belong to the group below?
Rootkit
Ransomware
Adware
Firewall
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term does not belong to the group below?
Norton
Trojan Horse
Kaspersky
McAfee
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Please tick the term(s) below for some validation process.
encode username and password
anti-virus
facial recognition
eye and retina
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The term referred to as (a) when a software or document went through validation and verification.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Which term is referred to as (a) when a password of a victim has been cracked and unauthorized user gain access to a person's account and confidential files?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the term below does not belong to the group?
Pharming
Phishing
Vishing
Spyware
None
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick the term(s) below that help you protect your computer and account from unauthorized access or malware.
Proxy Server
Firewall
Anti-virus
Ransomware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?