
Cyber crime and security
Authored by M. Kalra
Computers
6th - 8th Grade
Used 44+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
_____________ are usually skilled computer programmers with knowledge of computer security.
Thieves
Robbers
Hackers
Bad Guys
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ransomware is a type of ________________.
tupperware
malware
parryware
good software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software Piracy includes:
Violation of copyrights
Sharing multiple copies of software
Selling or installing multiple copies of software onto personal or work computers.
All of these
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Spambot creates mailing lists and sends ________ mail.
junk
important
deleted
necessary
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____________ __________ occurs when a criminal gains access to your personal information to steal money or gain other benefits.
Identification problem
Identity lost
Identity theft
identification theft
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Raj is working on the Internet and finds something suspicious about the website. What should he do in such a situation??
Check the URL
Enter his details
Login and not worry
None of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The intention of ___________ hacker is to steal corporate data, violate privacy rights, transfer funds from bank accounts. Identify the type of Hacker.
Grey Hat
White Hat
Black Hat
Blue Hat
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?