2nd Unit Test Emtech

2nd Unit Test Emtech

12th Grade

34 Qs

quiz-placeholder

Similar activities

Photography: Beyond Basics

Photography: Beyond Basics

9th - 12th Grade

30 Qs

Dressmaking

Dressmaking

7th - 12th Grade

30 Qs

Pressurization Modes

Pressurization Modes

12th Grade - University

30 Qs

adobe photoshop 2015 certification quiz 1

adobe photoshop 2015 certification quiz 1

9th - 12th Grade

39 Qs

OCR Cambridge National ICT LO3

OCR Cambridge National ICT LO3

KG - Professional Development

34 Qs

IED Reverse Engineering

IED Reverse Engineering

12th Grade

32 Qs

Engine Test

Engine Test

12th Grade

30 Qs

Java Control Structures

Java Control Structures

11th Grade - Professional Development

39 Qs

2nd Unit Test Emtech

2nd Unit Test Emtech

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

mhavz greda

Used 29+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It simply means the act of being safe online which an individual takes to protect himself from any threats, harms, and risks online.

Online Security

Online Ethics

Online Safety

Online Etiquettes

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Cybercrime Prevention Act of 2012, is a law in the Philippines approved on September 12, 2012. It aims to address the legal issues concerning online interactions and the Internet in the Philippines. It is now officially the ________.

Republic Act 10170

Republic Act 10173

Republic Act 10175

Republic Act 10178

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is any criminal activity that involves a computer, networked device, or network.

Cyberbullying

Cybercrime

Cybering

Computer Crime

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is the practice of registering, trafficking in, or using an Internet domain name, with a bad faith intent to profit from the goodwill of a trademark belonging to someone else.

Cybersquatting

Identity Theft

Name Jacking

Typosquatting

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is known as URL Hijacking.

Cybersquatting

Identity Theft

Name Jacking

Typosquatting

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

The image shows an example of ____________________.

Cybersquatting

Identity Theft

Typosquatting

Name Jacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is unauthorized usage of system accounts like their name and identifying number or credit card number without their permission to commit fraud or other crimes.

Cybersquatting

Identity Theft

Name Jacking

Typosquatting

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?