GEP-1 HOW ANNOYING!

GEP-1 HOW ANNOYING!

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

Questions & Quick Responses - Part A:F - Society/Current Affairs

Questions & Quick Responses - Part A:F - Society/Current Affairs

4th Grade - Professional Development

16 Qs

Reading 1

Reading 1

12th Grade

10 Qs

Scams - Pre-Reading Quiz

Scams - Pre-Reading Quiz

2nd Grade - University

11 Qs

English Time for 11th grade

English Time for 11th grade

11th Grade

10 Qs

Cyber Safety Rules

Cyber Safety Rules

6th Grade - University

15 Qs

 "Fighting the Bully Battle"

"Fighting the Bully Battle"

7th Grade - University

11 Qs

Text Evidence Practice 1

Text Evidence Practice 1

9th - 10th Grade

18 Qs

CCE ECG 2025 (online scams)

CCE ECG 2025 (online scams)

1st Grade - University

8 Qs

GEP-1 HOW ANNOYING!

GEP-1 HOW ANNOYING!

Assessment

Quiz

English

9th - 12th Grade

Medium

CCSS
L.11-12.6, RI.11-12.10, RI.11-12.8

+12

Standards-aligned

Created by

hendra doy

Used 14+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the best answer!

Which of the following is a type of online attack?

Cyber bullying

Hoax

Phising

Romance scam

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the best answer!

What is a common feature of a phishing attack?

A stranger sends a message to the victim

The victim is subjected to verbal abuse online

The attacker sends a fake message pretending to be a legitimate entity

The victim is targeted in a romantic scam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the best answer!

Which term refers to the act of tricking someone into giving away their personal information through fraudulent means?

Phising

Attack

Cyber bullying

Hoax

Tags

CCSS.L.11-12.6

CCSS.L.8.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.9-10.2D

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

What is the term used to describe the act of using the internet to harass, intimidate or threaten someone?

Phishing

Attack

Cyber bullying

Hoax

Tags

CCSS.L.11-12.6

CCSS.L.8.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.9-10.2D

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

Which of the following is an example of a social engineering attack?

Phishing

Attack

Cyber bullying

Hoax

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

Which term refers to the act of pretending to be someone else online to gain the trust of another person for fraudulent purposes?

Phishing

Romance scam

Cyber bullying

Hoax

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the correct answer!

What is the term used to describe a false story or piece of information that is spread deliberately to deceive people?

Phishing

Romance scam

Cyber bullying

Hoax

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?