Unit 10 Lessons  1-10

Unit 10 Lessons 1-10

9th Grade

20 Qs

quiz-placeholder

Similar activities

IT Unit 1 Introduction

IT Unit 1 Introduction

3rd - 12th Grade

20 Qs

SHS 9.3 Databases

SHS 9.3 Databases

9th Grade

16 Qs

computer quiz 1

computer quiz 1

3rd - 10th Grade

15 Qs

Level 8

Level 8

9th - 12th Grade

20 Qs

Bebras Colage B

Bebras Colage B

7th - 12th Grade

15 Qs

Presentations Quiz

Presentations Quiz

6th - 12th Grade

20 Qs

Network - Types of Network & Encryption

Network - Types of Network & Encryption

8th - 10th Grade

16 Qs

Enterpreneurship Grade 10 A

Enterpreneurship Grade 10 A

9th - 10th Grade

15 Qs

Unit 10 Lessons  1-10

Unit 10 Lessons 1-10

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Sheila McKay

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

computing innovation

phishing

Personal Identifiable Information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information about an individual that identifies, links, relates, or describes them.

Computing innovation

Phishing

Personal Identifiable Information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

computing innovation

phishing

Personal Identifiable Information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

keylogging

phishing

malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

keylogging

phishing

malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that give unauthorized access to secure networks.

rogue access point

encryption

decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process of encoding messages to keep them secret, so only "authorized" parties can read it.

rogue access point

encryption

decryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?