Viruses & Identity Theft

Viruses & Identity Theft

University

10 Qs

quiz-placeholder

Similar activities

TRYOUT 2 - UN SMP/MTS BAHASA INGGRIS - PART 2

TRYOUT 2 - UN SMP/MTS BAHASA INGGRIS - PART 2

University

14 Qs

REPEATED AND DOUBLE COMPARATIVES

REPEATED AND DOUBLE COMPARATIVES

University

10 Qs

Guess the character!

Guess the character!

4th Grade - Professional Development

10 Qs

How Well Do you Know Amex?

How Well Do you Know Amex?

University

15 Qs

B1 KeN U1-6 Vocab Review

B1 KeN U1-6 Vocab Review

7th Grade - University

15 Qs

Extraordinary Women - Colette

Extraordinary Women - Colette

9th Grade - University

15 Qs

Guía 6: Laboratory assessment and diagnosis of congenital viral infections

Guía 6: Laboratory assessment and diagnosis of congenital viral infections

University

15 Qs

Mixed Grammar

Mixed Grammar

10th Grade - University

10 Qs

Viruses & Identity Theft

Viruses & Identity Theft

Assessment

Quiz

English

University

Practice Problem

Hard

CCSS
RI.9-10.4, RI.11-12.8, RF.3.3B

+11

Standards-aligned

Created by

Mr. Adhit

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attacks anti-virus software is called?

Hacker

Resident Extension

Anti-antivirus virus

Piggyback

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program file that installs itself without permission is called?

Virus

Hacker

Host

Anti-antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that copies its code over and destroys the files of the original data is called?

Piggyback

Hacker

Overwriting virus

Resident extension

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who illegally exploits computer hardware and software is named ....

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A computer system that has a virus attached to it is named .. ...

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Tricking people into giving information through email is named . . . .

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.8.7

CCSS.RL.9-10.7

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A program that gathers personal information is named . . . . .

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?