Search Header Logo

[RB3-Ch8] Data Protection & Security

Authored by Muhammad Amir Rizwan

Computers

6th - 8th Grade

Used 22+ times

[RB3-Ch8] Data Protection & Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords are used to ensure data ______________.

Redundency

Spamming

Entry

Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stealing data from a computer by posing as its owner is called ______________.

integrity
identity theft
mistakes
accuracy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A scam is a form of internet ______________.

Network

Transposing

Fraud

Text

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ and ___________ can self-replicate.

Light,dark
validation
errors

Viruses, Worms

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______________ software can transmit viruses.

Pirated

Verification

Normal

Range

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Trojan horse is a useful program that appears to be harmful.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker is a person who gains unauthorized access to a computer data.

Ture

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?