Online Safety, Security, Ethics, and Etiquette Standards

Online Safety, Security, Ethics, and Etiquette Standards

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz: AI Generated

Cybersecurity Quiz: AI Generated

12th Grade

10 Qs

Tecnologia

Tecnologia

12th Grade

12 Qs

Internet Protocols. Edexcel GCSE Computer Science

Internet Protocols. Edexcel GCSE Computer Science

8th - 12th Grade

12 Qs

Güvenli İnternet

Güvenli İnternet

1st Grade - University

15 Qs

Online Security_ETech

Online Security_ETech

11th Grade - University

14 Qs

Evaluación Informática

Evaluación Informática

9th - 12th Grade

10 Qs

Lesson 2 - Post Test

Lesson 2 - Post Test

12th Grade

10 Qs

Netiquette and online studying

Netiquette and online studying

12th Grade

10 Qs

Online Safety, Security, Ethics, and Etiquette Standards

Online Safety, Security, Ethics, and Etiquette Standards

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

Ms. Mariel

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It displays unwanted ads when a user is surfing the internet.

Spyware

Rogue security software

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and convince them to pay for a fake malware removal tool.

Rogue security software

Spyware

Adware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

Phishing

Spam

Trojans

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

Spyware

Rogue security software

Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These are unwanted emails.

Spam

Phishing

Pharmers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

Worm

Keylogging

Netiquette

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening infected email attachments.

Virus

Trojans

Spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?