Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

8th Grade

50 Qs

quiz-placeholder

Similar activities

Scratch

Scratch

6th - 8th Grade

49 Qs

Keyboarding Techniques & Finger Placement - Test

Keyboarding Techniques & Finger Placement - Test

6th - 8th Grade

50 Qs

Email Etiquette

Email Etiquette

8th Grade

50 Qs

KS3 Graphics Assessment

KS3 Graphics Assessment

7th - 9th Grade

50 Qs

T. I. C.

T. I. C.

1st - 9th Grade

46 Qs

Web Authoring (10th)

Web Authoring (10th)

8th - 12th Grade

50 Qs

2학기 3-4단원

2학기 3-4단원

7th Grade - University

50 Qs

Green Architecture SLO

Green Architecture SLO

8th Grade

55 Qs

Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Alaa Al Aloul

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability

Digital Security Risk

Computer Crime

Cybercrime

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Any computer/ ICT-illegal act is classified as:

Crimeware

Computer Crime

Cybercrime

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It refers to online or Internet-based illegal acts

Crimeware

Computer Crime

Cybercrime

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Software used by cyber criminals is called:

Crimeware

Computer Crime

Cybercrime

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It refers to someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action

Hacker

Cracker

Corporate Spy

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A ________________ has the same intent as a cracker but does not have the technical skills and knowledge.

Script Kiddie

Hacker

Corporate Spy

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A ________________ is someone who demands payment to stop an attack on an organization's technology infrastructure.

Cyber Extortionist

Cyber Terrorist

Corporate Spy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers