Search Header Logo

C5- Managing computing securely, safely and ethically

Authored by Nur Tsawaabit

Computers

11th Grade

Used 8+ times

C5- Managing computing securely, safely and ethically
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

....... is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Cybercrime

Cyber security risk

Cyberextortion

Computer Virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

....... is an online or Internet-based illegal act.

Cybercrime

Cyber security risk

Cyberextortion

Computer Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT the category of cybercriminals

Hacker

Crackers

Script kiddies

Corporate spies

Ethical employees

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the risks of computer security!

Internet and network attacks

Unauthorized access and use

Information theft

Hardware theft

Illegal copying

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Provide an example of unauthorized access and use!

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Provide an example of Internet and network attacks!

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

....... affects a computer negatively by altering the way the computer works.

Computer virus

Worm

Trojan horse

Rootkit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?