
Online Safety, security and netiquettes
Authored by Rymart Zaragoza
Computers, Mathematics
3rd Grade
Used 34+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Jonathan is having a problem because his files were corrupted. He discovered that most of his folders were replicated.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Ken was asked to pay a certain amount of money for him to retrieve his files. Ken might be a victim of ______.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Mari found a good application and she installed it on her computer. But after the installation some of her files were deleted.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Jack is receiving several irrelevant messages every day and his e-mail account has become almost unusable.
5.
FILL IN THE BLANK QUESTION
1 min • 5 pts
The network servers of KNCHS stopped to respond and it was found out that much of the systems' memory was consumed by the malicious software. What kind of malware is this?
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Jewel is using a technique that tries to take information from the user. She commonly takes things like credit cards, usernames, passwords, and home addresses using a fake website. What type of threat is depicted in the scenario?
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
This program can record all you enter on your keyboard.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?