Midterm in Social and Professional Issues

Midterm in Social and Professional Issues

University

25 Qs

quiz-placeholder

Similar activities

Ethics in Cyberspace

Ethics in Cyberspace

University

25 Qs

MGMF024-Quiz 1

MGMF024-Quiz 1

University

20 Qs

TSI Quiz Chp 4

TSI Quiz Chp 4

University

20 Qs

KAMALUDDEEN IBRAHIM YARIMA

KAMALUDDEEN IBRAHIM YARIMA

University

20 Qs

Living in the IT era QUIZ 2

Living in the IT era QUIZ 2

University

20 Qs

Computer system software

Computer system software

University

24 Qs

Chapter 2 - Network & Computer Attacks #BNS3333

Chapter 2 - Network & Computer Attacks #BNS3333

University

22 Qs

computer ethics

computer ethics

University

21 Qs

Midterm in Social and Professional Issues

Midterm in Social and Professional Issues

Assessment

Quiz

Computers

University

Hard

Created by

Annife Cruz

Used 15+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any software that is written with negative intentions

shareware

freeware

malware

software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

it is defined as a criminal act that has been committed using a computer as the principal tool.

hacking

virus attacks

identity theft

computer crime

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

involves the use of an employer's computer resources for personal work.

theft of computer time

theft of goods

theft of information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is an area of criminal activity that has been adapted to the Internet

Corporate espionage

Computer fraud

Identity theft

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

it contains a great deal of information of interest to competitors, including product development plans, customer contact lists, product specifications, manufacturing process knowledge, and strategic plans.

Corporate espionage

Computer fraud

Identity theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

involves not just the theft of credit card numbers, but also national insurance or social security numbers, bank account details, addresses, and any other personal data that a person might use to verify their identity.

Computer fraud

Corporate espionage

Identity theft

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the simplest and most widely used computer security measures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?