Ethics and Safety measures in Computing

Ethics and Safety measures in Computing

6th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Viruses & Malware

Viruses & Malware

6th - 8th Grade

10 Qs

Types of Malware 10GB

Types of Malware 10GB

10th - 11th Grade

10 Qs

Network Threats Key Terms

Network Threats Key Terms

6th Grade

13 Qs

[RB3-Ch8] Data Protection & Security

[RB3-Ch8] Data Protection & Security

6th - 8th Grade

15 Qs

Programas Maliciosos s/pdf

Programas Maliciosos s/pdf

11th Grade

15 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Ethics and Safety measures in Computing

Ethics and Safety measures in Computing

Assessment

Quiz

Computers

6th - 12th Grade

Hard

Created by

Genius Tactician

Used 101+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the programs called used for searching any information on internet?

Internet Explorer

Social Media

Search Engine

Search Box

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

____________ means buying and selling of goods online.

E-services

E-commerce

E-marketing

E-business

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A malicious program that attacks a computer and harms the users data in many ways.

Spam

Malware

Spyware

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Acceptable behaviour for using a computer and the internet.

Cybercrime

Ethics

Computer Ethics

Ethical Practices

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A person who breaks into a computer system for the purpose of resolving any issue.

Hacker

White Hat Hacker

Black Hat Cracker

Cracker

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A network security program to keep a check on incoming and outgoing information.

Spyware

Firewall

Protector

Adware

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Repeatedly sending the same email to a particular address.

E-mail spoofing

Email flooding

Flooding

E-mail bombing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?