Ethics Security Privacy Vocabulary

Ethics Security Privacy Vocabulary

6th - 8th Grade

25 Qs

quiz-placeholder

Similar activities

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

Understanding Computers KS3 Y7 EoHT

Understanding Computers KS3 Y7 EoHT

7th Grade

20 Qs

GCSE J277 - 1.6.1 - Legal Issues

GCSE J277 - 1.6.1 - Legal Issues

7th Grade

20 Qs

SensorOne Quiz 2 - Digital Systems- TE4-7DI

SensorOne Quiz 2 - Digital Systems- TE4-7DI

7th Grade

20 Qs

Computer Parts

Computer Parts

6th - 8th Grade

20 Qs

Computer System

Computer System

6th Grade

20 Qs

Computer Studies Grade 7 Revision

Computer Studies Grade 7 Revision

7th - 8th Grade

20 Qs

Computer Fundamentals

Computer Fundamentals

6th Grade

20 Qs

Ethics Security Privacy Vocabulary

Ethics Security Privacy Vocabulary

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Madeline J

Used 9+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

Data Filter

Data Converter

Firewall

Conversion Code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Topic are we Learning in this Unit

Technology Ethics

Computer Design

Computer Ethics

Behavior

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.

Lying

Cybercrime

Spoofing

Computer Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copy and Paste is considered Plagiarism?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Does DoS stand For

Inaccessable

Denial of Service

Denial of Station

Deal of Stratta

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

Devastating

Enterprise

Organized

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of converting information or data into a code, especially to prevent unauthorized access

Coding

Secrecy

Encryption

Hiding Data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?