CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

9th Grade

13 Qs

quiz-placeholder

Similar activities

Windows Basic Vocab 1

Windows Basic Vocab 1

9th - 12th Grade

10 Qs

สอบปลายภาคเรียน2/64 วิทยาการคำนวณ

สอบปลายภาคเรียน2/64 วิทยาการคำนวณ

9th Grade

10 Qs

S2 Subject Choice Quiz

S2 Subject Choice Quiz

8th - 10th Grade

10 Qs

PHIẾU HỌC TẬP 1

PHIẾU HỌC TẬP 1

3rd - 12th Grade

10 Qs

TGS Inicial

TGS Inicial

1st - 12th Grade

15 Qs

Basic computer

Basic computer

9th - 12th Grade

8 Qs

CPU

CPU

7th - 12th Grade

13 Qs

Vocab-Operating Systems Basics Quiz

Vocab-Operating Systems Basics Quiz

9th - 12th Grade

10 Qs

CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

Assessment

Quiz

Computers

9th Grade

Practice Problem

Easy

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can be physical (self-driving car), non-physical computing software (picture editing software), or non-physical computing concepts (e-commerce).

Personally Identifiable Information

Phishing

Computing Innovation

Public Key Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information about an individual that identifies, links, relates, or describes them.

Personally Identifiable Information

Phishing

Computing Innovation

Public Key Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

Malware

Phishing

Keylogging

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

Malware

Phishing

Keylogging

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

Malware

Phishing

Keylogging

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Malware

Rogue Access Point

Keylogging

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process of encoding messages to keep them secret, so only "authorized" parties can read it.

Decryption

Multi-factor Authentication

Computer Virus Scanning Software

Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?