
Ethical, Legal and Social Issues of Computing
Authored by Laura Young
Computers
9th - 11th Grade
Used 52+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
1. A process that proves the identity of the user.
Encryption
Phishing
Authentication
Cryptopgraphy
2.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
2. The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it.
Authentication
Encryption
Phishing
Cryptography
3.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
3. A cyberattack carried out by sending emails to large numbers of people asking for sensitive information.
Authentication
Encryption
Phishing
Cryptography
4.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
4. What is the art of writing or solving codes?
Authentication
Encryption
Decryption
Cryptography
5.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
5. What kind of information should you never give out in an unauthenticated email?
Birthdate
Full name
Any account information
All of the above
6.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
6. A system of interconnected people and/or things is called a_______.
Network
Prototype
Netflix
Neotype
7.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
7. The largest global network of computers is called__________.
Internet
Internet of Things
Network
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?