
[RB3-Ch8] Data Protection & Security
Authored by Muhammad Amir Rizwan
Computers
6th - 8th Grade
Used 22+ times
![[RB3-Ch8] Data Protection & Security](https://cf.quizizz.com/img/studentpreview.webp)
AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Passwords are used to ensure data ______________.
Spamming
Privacy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Stealing data from a computer by posing as its owner is called ______________.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A scam is a form of internet ______________.
Transposing
Fraud
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
___________ and ___________ can self-replicate.
Viruses, Worms
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______________ software can transmit viruses.
Verification
Normal
Range
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Trojan horse is a useful program that appears to be harmful.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker is a person who gains unauthorized access to a computer data.
Ture
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?