Online Safety, security and netiquettes

Online Safety, security and netiquettes

3rd Grade

15 Qs

quiz-placeholder

Similar activities

E-Safety

E-Safety

KG - 12th Grade

10 Qs

VÍRUS DE COMPUTADORES

VÍRUS DE COMPUTADORES

1st Grade - Professional Development

10 Qs

QUIZ DE TECNOLOGÍA E INFORMÁTICA CICLO IV (periodo 3)

QUIZ DE TECNOLOGÍA E INFORMÁTICA CICLO IV (periodo 3)

1st - 12th Grade

10 Qs

Cybersecurityawareness2024

Cybersecurityawareness2024

1st - 5th Grade

20 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Conficker

Conficker

KG - Professional Development

15 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

10 Qs

Online Safety, security and netiquettes

Online Safety, security and netiquettes

Assessment

Quiz

Computers, Mathematics

3rd Grade

Hard

Created by

Rymart Zaragoza

Used 34+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Jonathan is having a problem because his files were corrupted. He discovered that most of his folders were replicated.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Ken was asked to pay a certain amount of money for him to retrieve his files. Ken might be a victim of ______.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Mari found a good application and she installed it on her computer. But after the installation some of her files were deleted.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Jack is receiving several irrelevant messages every day and his e-mail account has become almost unusable.

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

The network servers of KNCHS stopped to respond and it was found out that much of the systems' memory was consumed by the malicious software. What kind of malware is this?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Jewel is using a technique that tries to take information from the user. She commonly takes things like credit cards, usernames, passwords, and home addresses using a fake website. What type of threat is depicted in the scenario?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This program can record all you enter on your keyboard.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?