Search Header Logo

Ethical, Legal and Social Issues of Computing

Authored by Laura Young

Computers

9th - 11th Grade

Used 52+ times

Ethical, Legal and Social Issues of Computing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

1. A process that proves the identity of the user.

Encryption

Phishing

Authentication

Cryptopgraphy

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

2. The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it.

Authentication

Encryption

Phishing

Cryptography

3.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

3. A cyberattack carried out by sending emails to large numbers of people asking for sensitive information.

Authentication

Encryption

Phishing

Cryptography

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

4. What is the art of writing or solving codes?

Authentication

Encryption

Decryption

Cryptography

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

5. What kind of information should you never give out in an unauthenticated email?

Birthdate

Full name

Any account information

All of the above

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

6. A system of interconnected people and/or things is called a_______.

Network

Prototype

Netflix

Neotype

7.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

7. The largest global network of computers is called__________.

Internet

Internet of Things

Network

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?