Banzai Review

Banzai Review

5th Grade

14 Qs

quiz-placeholder

Similar activities

Safety Digital Citizenship

Safety Digital Citizenship

4th - 9th Grade

15 Qs

aerospace engineering

aerospace engineering

KG - Professional Development

10 Qs

Google Classroom

Google Classroom

KG - 12th Grade

16 Qs

Digital Footprint & Passwords

Digital Footprint & Passwords

4th Grade - University

15 Qs

Keyboarding Basics

Keyboarding Basics

3rd - 5th Grade

15 Qs

Website Evaluation

Website Evaluation

3rd - 6th Grade

10 Qs

Introduction to MS Word

Introduction to MS Word

1st - 10th Grade

15 Qs

Input Devices

Input Devices

5th - 6th Grade

10 Qs

Banzai Review

Banzai Review

Assessment

Quiz

Instructional Technology

5th Grade

Medium

Created by

Mary Ann Sanderson

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

DRAG AND DROP QUESTION

1 min • 1 pt

Software designed to damage a computer or phone is ​ ​ (a)  

malware
SSL certificate
Browser
brute force attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wifi is secure when ​

has a password

has an SSL certificate

has security questions

has been wiped

3.

DRAG AND DROP QUESTION

1 min • 1 pt

A website has an ​ (a)   when you see (b)   at the beginning of the website.

SSL certificate
https://
www.
badge
abouts us shown

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malicious adware?

exposes you to catfishing.

Install viruses onto your device, show you inappropriate ads, or show you excessive ads online.

Installs software thatlocks your computer till a sum of money is paid.

A software that protects you from hackers.

5.

DROPDOWN QUESTION

1 min • 1 pt

​ (a)   is the type of software that locks your device until you pay a hacker to gain access again?

Ransomware
Bribeware
Kidnapware
Hostageware

6.

DRAG AND DROP QUESTION

1 min • 1 pt

If you give someone ​ (a)   to your device, they can control it through another phone or computer.

remote access
distant access
control priviledge
distance privilege
control privilege

7.

DRAG AND DROP QUESTION

1 min • 1 pt

Sometimes a hacker is able to force their way into a company's system, exposing sensitive information like passwords, email addresses, or credit card numbers. What is the term for this situation?​ (a)  

A security breach
a hacka attack a data crisis
a system raid
a hack attack
a data crisis

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?