Search Header Logo

IT Ethics

Authored by Karthikeyan S

Computers

7th Grade - Professional Development

IT Ethics
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Personal principles that dictate individual beliefs about right and wrong

Ethics

Law

Morals

Norms

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are the example of internet threat?

Back door

Virus & Worm

Spyware

Trojan and key logger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ is criminal trespass over the Internet or unauthorized access that results in damaged files, programs or hardware.

Cyber Attack

Virus Attack

Trojan Attack

Phishing

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Password must be with the following criteria:

Should have 8 characters or more

Should contain capitals, numerals, non-alphanumeric characters

Should be kept securely somewhere

Should be obvious from a dictionary

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are the ways to protect system from virus?

use a firewall

use anti-virus software

use anti-spyware tools

filter email from spam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the security risk management process?

Assessment

Planning

Implementation

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is presenting someone else’s work as your own.

Identity theft
Plagiarism
Phising
Hacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?