Search Header Logo

Online Threats

Authored by Aida Plazzotta

Computers

8th Grade

Used 32+ times

Online Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

WHICH ARE THE PERSONAL DETAILS?

Shoe size

Favourite dessert

date of birth

home address

2.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

WHICH IS A VULNERABILITY FOR YOUR COMPUTER?

Basic keyboard

Weak password

Being placed by a TV set

lack of antivirus software

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

TROJAN is a harmful software that is disguised as

an apple

a toy

a normal file

a mouse

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which harmful software is sent by email and make copies of itself and spread on its own?

Photoshop

Worm

Paint it!

Scratch

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

VIRUSES spread to all computers in a network

TRUE

FALSE

MAYBE

6.

OPEN ENDED QUESTION

30 sec • Ungraded

What is a cyber criminal?

Evaluate responses using AI:

OFF

Answer explanation

Cyber criminal is a person who uses technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data that could help them to generate financial gains for themselves.

7.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

These are types of threats for a computer...

MALWARE

RUNWARE

ENGINEERING

SOCIAL ENGINEERING

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?