2.1 PLTW Data Diligence

2.1 PLTW Data Diligence

9th Grade

37 Qs

quiz-placeholder

Similar activities

MTA-98-368: Study Guide

MTA-98-368: Study Guide

9th - 12th Grade

40 Qs

Microsoft Word 2016

Microsoft Word 2016

9th - 12th Grade

38 Qs

Computer Networks (full) BGE S3

Computer Networks (full) BGE S3

9th - 10th Grade

36 Qs

98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

9th - 12th Grade

40 Qs

OCR J277 GCSE Paper 1 Recap

OCR J277 GCSE Paper 1 Recap

9th Grade - University

35 Qs

6. Encryption

6. Encryption

9th Grade

39 Qs

internet terms gpaul

internet terms gpaul

6th Grade - University

32 Qs

2.1 PLTW Data Diligence

2.1 PLTW Data Diligence

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Erin LoBue

Used 73+ times

FREE Resource

37 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Information about an individual, such as social security number, age, race,phone number(s), medical information, financial information, andbiometric data such as fingerprint records and retina scans.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The unauthorized access or retrieval of confidential or otherwise protected data.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Small text-based bits of information about your browser that a web server saves.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information,such as passwords and credit card numbers.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Software intended to damage a computing system or to take partialcontrol over its operation.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?