
CP N4 - Module 8
Authored by Tino Constance
Computers
KG
Used 46+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person in the nearby vicinity who has access to your Internet connection and uses your bandwidth because the router’s password is left open
Cracker
Hacker
Bandwidth Thief
Identity Thief
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This takes place when you take someone else’s work and pass it off as your own
Plagiarism
Identity Theft
Copyrighting
Cracker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any illegal activity related to ICT and the internet
Piracy
Cyberlife
Cybertime
Cybercrime
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Someone who illegally copies software or written material without a license or permission.
Software Pirate
Hardware Pirate
Software Thief
Software Stealer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person who misuses the personal information of someone else, usually as a method to gain a financial advantage.
Cracker
Hacker
Identity Thief
Software Pirate
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an emergency, ICT can connect people to an online doctor for assistance.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ergonomics is the study of a person’s mental comfort in the workplace.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?