Search Header Logo

Viruses & Identity Theft

Authored by Mr. Adhit

English

University

CCSS covered

Used 9+ times

Viruses & Identity Theft
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attacks anti-virus software is called?

Hacker

Resident Extension

Anti-antivirus virus

Piggyback

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program file that installs itself without permission is called?

Virus

Hacker

Host

Anti-antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that copies its code over and destroys the files of the original data is called?

Piggyback

Hacker

Overwriting virus

Resident extension

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who illegally exploits computer hardware and software is named ....

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A computer system that has a virus attached to it is named .. ...

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Tricking people into giving information through email is named . . . .

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.8.7

CCSS.RL.9-10.7

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A program that gathers personal information is named . . . . .

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?