
Module 5 Quiz
Authored by James Martin
Computers, Instructional Technology
8th - 12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any illegal act involving the use of a computer or related devices generally is referred to as a
Tort
Crime
Computer crime
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____________ is hardware and/or software that protects a network’s resources from intrusion
Firewall
Malware
Operating System (OS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_________ is the discovery, collection, and analysis of evidence found on computers and networks
Digital forensics
Digital journal
Digital literacy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is short for malicious ______
Hardware
Software
Adware
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A _____________ is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an example of a biometric device?
Fingerprint reader
Face recognition
Voice recognition
Two-step verification
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
__________ is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?