Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

8th Grade

50 Qs

quiz-placeholder

Similar activities

ICF 8

ICF 8

8th Grade

50 Qs

Computing Heroes Quiz KS3

Computing Heroes Quiz KS3

5th - 10th Grade

53 Qs

Computer Basics

Computer Basics

6th - 8th Grade

50 Qs

Malware- online security

Malware- online security

5th - 10th Grade

50 Qs

Computer Basics

Computer Basics

6th - 12th Grade

45 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

IT for life

IT for life

KG - University

55 Qs

Digital Applications Pre-Post Assessment

Digital Applications Pre-Post Assessment

8th Grade

50 Qs

Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Alaa Al Aloul

Used 7+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability

Digital Security Risk

Computer Crime

Cybercrime

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Any computer/ ICT-illegal act is classified as:

Crimeware

Computer Crime

Cybercrime

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It refers to online or Internet-based illegal acts

Crimeware

Computer Crime

Cybercrime

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Software used by cyber criminals is called:

Crimeware

Computer Crime

Cybercrime

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It refers to someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action

Hacker

Cracker

Corporate Spy

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A ________________ has the same intent as a cracker but does not have the technical skills and knowledge.

Script Kiddie

Hacker

Corporate Spy

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A ________________ is someone who demands payment to stop an attack on an organization's technology infrastructure.

Cyber Extortionist

Cyber Terrorist

Corporate Spy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?