IT Security

IT Security

3rd - 6th Grade

7 Qs

quiz-placeholder

Similar activities

Password Security

Password Security

4th - 5th Grade

10 Qs

Office 365

Office 365

KG - University

10 Qs

Internet and Computer Safety Essential Terms

Internet and Computer Safety Essential Terms

6th - 8th Grade

10 Qs

Sequence and Conditions

Sequence and Conditions

3rd - 5th Grade

10 Qs

Computer safety

Computer safety

3rd - 5th Grade

10 Qs

Internet Safety

Internet Safety

KG - 5th Grade

10 Qs

Devices and variables

Devices and variables

5th Grade

12 Qs

Computer Privacy and security

Computer Privacy and security

6th - 8th Grade

11 Qs

IT Security

IT Security

Assessment

Quiz

Computers

3rd - 6th Grade

Medium

Created by

Robin Archibald

Used 21+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Privacy is about -


Tick all that are correct.

Protecting a person's data

Protecting someone's personal information

Allowing someone access to information

Keeping sensitive information secret

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IT security mean?

Allowing anyone to access anything on a computer

Sharing passwords with friends

Protecting people’s devices and the software on them

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two step verification is a security process where logging in to a service requires two separate steps. What might these steps be?


Tick all that are correct.

A password

A code received on a phone by text message

A code generated by an app

A number your friend tells you.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following correctly describe a password?


Click all that are correct.

A secret combination used to access something.

It might be a four-digit number-only code

It's a long and complex sequence of letters and numbers.

It is something that is easy to guess.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct definition of Encryption?

A code that is easy to unscramble.

A synonym for another word.

The process of converting information or data into a code that makes it unreadable and inaccessible.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords is the most secure and complex?

!234S6

password

Mvemj5unp

qwerty

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data is called a


You MUST spell correctly!

Discover more resources for Computers