
Cybercrime
Authored by Aleksandra Arzaņājeva
English
8th Grade
CCSS covered
Used 52+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The hacker was arrested for ....... computer viruses.
downloading
spreading
disrupting
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RI.6.4
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hackers ....... weaknesses in computer systems.
warn
exploit
gain
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RI.6.4
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark was a victim of identity .........
taking
robbery
theft
Tags
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RL.8.4
CCSS.RL.9-10.4
CCSS.RL.7.4
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hackers break into ...... systems all the time.
traffic
computer
law
Tags
CCSS.RF.3.3B
CCSS.RF.3.3C
CCSS.RF.3.3D
CCSS.RF.4.3A
CCSS.RF.5.3A
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Some poeple enjoy making...............for others on the Internet.
mischief
access
alter
Tags
CCSS.RI.9-10.4
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RL.8.4
CCSS.RL.9-10.4
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
My antivirus system is very old, I can't ........... on it.
hack
navigate
rely
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RI.6.4
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. ________________ means sending out-e-mails from false financial institutions to try to obtain confidential details.
illegal downloading
hacking
phishing
Tags
CCSS.RI.7.7
CCSS.RI.8.7
CCSS.RI.9-10.7
CCSS.RL.7.7
CCSS.RL.8.7
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?