Viruses & Identity Theft

Viruses & Identity Theft

University

10 Qs

quiz-placeholder

Similar activities

PASSWORD TECH

PASSWORD TECH

University

10 Qs

Security in the internet

Security in the internet

12th Grade - University

10 Qs

RISKS AND HAZARDS AT WORKPLACE!

RISKS AND HAZARDS AT WORKPLACE!

University

10 Qs

KA-23.08.2022

KA-23.08.2022

1st Grade - University

11 Qs

Computer Security

Computer Security

University

10 Qs

Virus and thieves

Virus and thieves

University

7 Qs

How much do you know about technology?

How much do you know about technology?

12th Grade - University

10 Qs

Open House Question Set 4

Open House Question Set 4

University

10 Qs

Viruses & Identity Theft

Viruses & Identity Theft

Assessment

Quiz

English

University

Hard

CCSS
RI.9-10.4, RI.11-12.8, RF.3.3B

+11

Standards-aligned

Created by

Mr. Adhit

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attacks anti-virus software is called?

Hacker

Resident Extension

Anti-antivirus virus

Piggyback

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program file that installs itself without permission is called?

Virus

Hacker

Host

Anti-antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that copies its code over and destroys the files of the original data is called?

Piggyback

Hacker

Overwriting virus

Resident extension

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who illegally exploits computer hardware and software is named ....

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A computer system that has a virus attached to it is named .. ...

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Tricking people into giving information through email is named . . . .

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.8.7

CCSS.RL.9-10.7

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A program that gathers personal information is named . . . . .

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?