IT

IT

2nd Grade

7 Qs

quiz-placeholder

Similar activities

Basic Science week 5

Basic Science week 5

2nd Grade

10 Qs

CYBER SECURITY AND RISKMAN

CYBER SECURITY AND RISKMAN

1st - 5th Grade

11 Qs

examen prueba

examen prueba

1st - 5th Grade

3 Qs

فاينل ٧

فاينل ٧

2nd Grade

10 Qs

Micro-organismes

Micro-organismes

1st Grade - University

10 Qs

Kuiz Mengenai Nyamuk Aedes dan Demam Denggi

Kuiz Mengenai Nyamuk Aedes dan Demam Denggi

2nd Grade

8 Qs

Usare DALL·E per Creare Immagini con l'IA

Usare DALL·E per Creare Immagini con l'IA

2nd Grade

10 Qs

English Grammar Quiz

English Grammar Quiz

1st - 5th Grade

10 Qs

IT

IT

Assessment

Quiz

Others

2nd Grade

Medium

Created by

Bayan Alammari

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that assigns an e-mail message to a unique code number (digital fingerprint) for each computer so only that computer, not others, can open and read the message.

Encryption System

Anti-Virus Software

Spam

Trojan Horses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Program unknowingly down- loaded by users that monitors their computer activities, gathering e-mail addresses, credit card numbers, and other information that it transmits to someone outside the host system.

Worms

Spyware

Intellectual Property Theft

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Product that protects systems by searching incoming e-mails and data files for “signatures” of known viruses and virus-like characteristics.

Viruses

Encryption System

Anti-Virus Software

Identity Theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Junk e-mail sent to a mailing list or a newsgroup.

Inbox

Spam

Firewall

Hackers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Product that protects systems by searching incoming e-mails and data files for “signatures” of known viruses and virus-like characteristics.

Viruses

Encryption System

Anti-Virus Software

Identity Theft

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Have you ever tried to hack into someone’s social media account?

No way!

Maybe

Yes

No

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unauthorized use of personal information (such as Social Security number and address) to get loans, credit cards, or other monetary benefits by impersonating the victim.

Hackers

Identity Theft

Spyware

Intellectual Property