Computer Review

Computer Review

5th Grade

17 Qs

quiz-placeholder

Similar activities

Unit 5 Lesson 1 and 3 Content Test

Unit 5 Lesson 1 and 3 Content Test

5th Grade

19 Qs

SC.5.L.17.1 Weekly Benchmark Assessment

SC.5.L.17.1 Weekly Benchmark Assessment

3rd - 6th Grade

20 Qs

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

Informatyka.Cyberbezpieczeństwo,e-zasoby i współpraca zdalna

Informatyka.Cyberbezpieczeństwo,e-zasoby i współpraca zdalna

1st - 6th Grade

13 Qs

GLAT Science Test 1

GLAT Science Test 1

5th - 6th Grade

15 Qs

Bacteria vs. Viruses Pre-Test / Post-Test

Bacteria vs. Viruses Pre-Test / Post-Test

5th Grade

18 Qs

Adaptations

Adaptations

5th Grade

20 Qs

Intro to Scratch

Intro to Scratch

4th - 8th Grade

15 Qs

Computer Review

Computer Review

Assessment

Quiz

Science, Computers, Education

5th Grade

Practice Problem

Easy

Created by

Muhammad Sualeh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is cyber crime ?

A crime committed in the street

A crime committed using a computer or network

Theft of a computer

Theft of a mobile device

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cyber Security is also called _______________________________

Information Security

Cyber crime

Information Technology Security

Technology Security

CIA Triad

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

____________________ is when a hacker encrypts a user's data and demands ransom in exchange for data.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Crypto jacking is also known as zombie attack

True

False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

_________________ displays advertisements, offers and prizes and asks you to give personal and bank account details.

Ransomware

Botnets Attack

Social Engineering Attack

Phishing

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are continuously receiving spam emails which pretend to be from Oxford University.

Which cyber crime is this?

Social Engineering Attack

Phishing

Botnets Attack

Crypto Jacking

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select all the things that are part of the CIA Triad.

Integrity

Botnets

Confidentiality

Availability

Phishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?