
ICT 1 legal issues
Authored by Mables Agapito
Computers
12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Phishing is a type of cybercrime where attackers attempt to trick individuals into providing sensitive information such as usernames, passwords, and credit card details.
Offering a job opportunity
Asking for help with a computer virus
Sending gifts to individuals
Trick individuals into providing sensitive information
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Identity theft involves stealing someone's personal information, such as their name, Social Security number, or credit card number, to commit fraud or other crimes.
Using personal information to apply for a job
Borrowing personal information to help someone else
Selling personal information for profit
Stealing personal information to commit fraud or other crimes
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Online fraud refers to any type of fraud scheme that uses the internet to carry out fraudulent activities, such as fake online auctions or investment scams.
True
False
Partially true
Only happens in movies
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Hacking is the unauthorized access, modification, or use of computer systems or networks, often for malicious purposes.
Unauthorized access, modification, or use of computer systems or networks
Modifying computer systems or networks with permission
Using computer systems or networks for legal purposes
Authorized access to computer systems or networks
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Malware is software designed to damage or disrupt computer systems, such as viruses, worms, and ransomware.
Trojans, spyware, and adware
Viruses, worms, and ransomware
Firewalls, antivirus, and encryption
Cookies, cache, and plugins
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Phishing attacks can only occur through email and not through other communication channels like social media or messaging apps.
Depends on the situation
Partially true
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Identity theft can only occur if someone physically steals your wallet or purse.
Only if they have access to your computer
True
False
Only if they have your social security number
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?