Search Header Logo

Ethics Security Privacy Vocabulary

Authored by Madeline J

Computers

6th - 8th Grade

Used 9+ times

Ethics Security Privacy Vocabulary
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

Data Filter

Data Converter

Firewall

Conversion Code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Topic are we Learning in this Unit

Technology Ethics

Computer Design

Computer Ethics

Behavior

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.

Lying

Cybercrime

Spoofing

Computer Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copy and Paste is considered Plagiarism?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Does DoS stand For

Inaccessable

Denial of Service

Denial of Station

Deal of Stratta

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

Devastating

Enterprise

Organized

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of converting information or data into a code, especially to prevent unauthorized access

Coding

Secrecy

Encryption

Hiding Data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?