
305 - DAY 5
Authored by Christian Fernandez
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Is a technical effort to manipulate the expected behavior of network connections and connected systems.
It refers to constructive, clever technical work that was not necessarily related to computer systems.
(a)
2.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Is an entity or person who uses computers to gain unauthorized access to data or information.
(a)
3.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Are standards and practices that influence how people lead their lives.
(a)
4.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Are a set of moral standards that govern the use of computers. It is society views about the use of computers, both hardware and software.
(a)
5.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
Is a legal method of breaching a security system to detect potential security threats.
(a)
6.
FILL IN THE BLANKS QUESTION
1 min • 5 pts
ENUMERATE (1-3) TYPES OF HACKER
(a)
7.
FILL IN THE BLANKS QUESTION
1 min • 5 pts
ENUMERATE (4-6) TYPES OF HACKER
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?