2nd Unit Test Emtech

2nd Unit Test Emtech

12th Grade

34 Qs

quiz-placeholder

Similar activities

adobe photoshop 2015 certification quiz 1

adobe photoshop 2015 certification quiz 1

9th - 12th Grade

39 Qs

MIL Finals Reviewer

MIL Finals Reviewer

12th Grade

35 Qs

Bandsaw Quiz

Bandsaw Quiz

9th - 12th Grade

35 Qs

Routing & Switching: Introduction to Networks - Chapter 1 Exam

Routing & Switching: Introduction to Networks - Chapter 1 Exam

11th - 12th Grade

34 Qs

Media and Information Literacy

Media and Information Literacy

12th Grade

30 Qs

Nguyên lí an toàn thông tin 2.

Nguyên lí an toàn thông tin 2.

12th Grade

31 Qs

Working at Height

Working at Height

12th Grade

32 Qs

trail

trail

12th Grade

32 Qs

2nd Unit Test Emtech

2nd Unit Test Emtech

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

mhavz greda

Used 29+ times

FREE Resource

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It simply means the act of being safe online which an individual takes to protect himself from any threats, harms, and risks online.

Online Security

Online Ethics

Online Safety

Online Etiquettes

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Cybercrime Prevention Act of 2012, is a law in the Philippines approved on September 12, 2012. It aims to address the legal issues concerning online interactions and the Internet in the Philippines. It is now officially the ________.

Republic Act 10170

Republic Act 10173

Republic Act 10175

Republic Act 10178

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is any criminal activity that involves a computer, networked device, or network.

Cyberbullying

Cybercrime

Cybering

Computer Crime

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is the practice of registering, trafficking in, or using an Internet domain name, with a bad faith intent to profit from the goodwill of a trademark belonging to someone else.

Cybersquatting

Identity Theft

Name Jacking

Typosquatting

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is known as URL Hijacking.

Cybersquatting

Identity Theft

Name Jacking

Typosquatting

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

The image shows an example of ____________________.

Cybersquatting

Identity Theft

Typosquatting

Name Jacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is unauthorized usage of system accounts like their name and identifying number or credit card number without their permission to commit fraud or other crimes.

Cybersquatting

Identity Theft

Name Jacking

Typosquatting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?