Cybersecurity and Global Impacts _code.org U8
Quiz
•
Computers
•
9th Grade
•
Practice Problem
•
Medium
Kristine Cody
Used 66+ times
FREE Resource
Enhance your content in a minute
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
information about an individual that identifies, links, relates, or describes them.
information about an individual that identifies, links, relates, or describes them.
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
phishing
keylogging
malware
rogue access point
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
phishing
keylogging
malware
rogue access point
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
software intended to damage a computing system or to take partial control over its operation
software intended to damage a computing system or to take partial control over its operation
phishing
keylogging
malware
rogue access point
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Ինֆորմատիկա 9
Quiz
•
9th - 10th Grade
15 questions
LA1.C1: Introduction to Small Basic
Quiz
•
9th Grade
10 questions
Soal Latihan 2 - Scratch
Quiz
•
8th - 12th Grade
15 questions
Cyber Security KS4
Quiz
•
8th - 12th Grade
15 questions
Linux-2 Quiz 2 -- LAMP
Quiz
•
1st - 12th Grade
15 questions
Empowerment Technologies
Quiz
•
KG - 12th Grade
10 questions
Creating Database Tables
Quiz
•
8th - 10th Grade
17 questions
Microsoft Office Quiz
Quiz
•
KG - 9th Grade
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
Discover more resources for Computers
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
10 questions
Identifying equations
Quiz
•
KG - University
18 questions
Thanksgiving Trivia
Quiz
•
4th - 12th Grade
20 questions
Thanksgiving
Quiz
•
KG - 12th Grade
20 questions
Pythagorean Theorem and Their Converse
Quiz
•
8th - 9th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
10 questions
Thanksgiving Trivia Challenge: Test Your Knowledge!
Interactive video
•
6th - 10th Grade
