Banzai Review

Banzai Review

5th Grade

14 Qs

quiz-placeholder

Similar activities

Redes de computadores

Redes de computadores

1st - 5th Grade

11 Qs

La Madera y la edad de los metales

La Madera y la edad de los metales

5th Grade

10 Qs

A ver … ¿Cuánto saben de señales?

A ver … ¿Cuánto saben de señales?

1st Grade - University

11 Qs

energia

energia

5th Grade

19 Qs

MATExprésate Operaciones Combinadas

MATExprésate Operaciones Combinadas

5th - 6th Grade

12 Qs

Hardware

Hardware

5th Grade

10 Qs

FÍSICA EN MOVIMIENTO PRUEBA BÁSICA

FÍSICA EN MOVIMIENTO PRUEBA BÁSICA

1st - 5th Grade

14 Qs

Presentación TIC´s

Presentación TIC´s

5th - 6th Grade

10 Qs

Banzai Review

Banzai Review

Assessment

Quiz

Instructional Technology

5th Grade

Practice Problem

Medium

Created by

Mary Ann Sanderson

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

DRAG AND DROP QUESTION

1 min • 1 pt

Software designed to damage a computer or phone is ​ ​ (a)  

malware
SSL certificate
Browser
brute force attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wifi is secure when ​

has a password

has an SSL certificate

has security questions

has been wiped

3.

DRAG AND DROP QUESTION

1 min • 1 pt

A website has an ​ (a)   when you see (b)   at the beginning of the website.

SSL certificate
https://
www.
badge
abouts us shown

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malicious adware?

exposes you to catfishing.

Install viruses onto your device, show you inappropriate ads, or show you excessive ads online.

Installs software thatlocks your computer till a sum of money is paid.

A software that protects you from hackers.

5.

DROPDOWN QUESTION

1 min • 1 pt

​ (a)   is the type of software that locks your device until you pay a hacker to gain access again?

Ransomware
Bribeware
Kidnapware
Hostageware

6.

DRAG AND DROP QUESTION

1 min • 1 pt

If you give someone ​ (a)   to your device, they can control it through another phone or computer.

remote access
distant access
control priviledge
distance privilege
control privilege

7.

DRAG AND DROP QUESTION

1 min • 1 pt

Sometimes a hacker is able to force their way into a company's system, exposing sensitive information like passwords, email addresses, or credit card numbers. What is the term for this situation?​ (a)  

A security breach
a hacka attack a data crisis
a system raid
a hack attack
a data crisis

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?