Search Header Logo

CP N4 - Module 8

Authored by Tino Constance

Computers

KG

Used 46+ times

CP N4 - Module 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person in the nearby vicinity who has access to your Internet connection and uses your bandwidth because the router’s password is left open

Cracker

Hacker

Bandwidth Thief

Identity Thief

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This takes place when you take someone else’s work and pass it off as your own

Plagiarism

Identity Theft

Copyrighting

Cracker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any illegal activity related to ICT and the internet

Piracy

Cyberlife

Cybertime

Cybercrime

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who illegally copies software or written material without a license or permission.

Software Pirate

Hardware Pirate

Software Thief

Software Stealer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who misuses the personal information of someone else, usually as a method to gain a financial advantage.

Cracker

Hacker

Identity Thief

Software Pirate

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an emergency, ICT can connect people to an online doctor for assistance.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ergonomics is the study of a person’s mental comfort in the workplace.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?