
EMPTECH Lesson 2 - STEM 1
Authored by Ronmar Gino
Computers
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is identity theft and how can individuals protect themselves from it?
Safeguarding personal information, using strong passwords, and monitoring financial accounts regularly
Leaving personal documents in public places
Sharing personal information on social media
Using the same password for all accounts
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Explain the concept of phishing in the context of identity theft.
Attackers send physical threats to intimidate individuals into giving up their personal information.
Phishing involves catching fish in a body of water to steal people's identities.
Attackers use advanced encryption techniques to protect individuals' sensitive information.
Attackers impersonate legitimate organizations to trick individuals into providing sensitive information.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is hacking and how does it differ from ethical hacking?
Ethical hacking is authorized and used to identify security vulnerabilities.
Hacking is used to improve security and ethical hacking is used to cause harm
Hacking and ethical hacking are the same thing
Hacking is a legal activity and ethical hacking is illegal
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Explain the term 'malware' and its role in hacking.
Malware is a legal software used for protecting computer systems
Malware is a term used to describe a type of computer virus
Malware is a type of hardware used for hacking
Malware is malicious software designed to damage or gain unauthorized access to a computer system.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the potential impacts of hacking on individuals and organizations?
Increased productivity and improved security.
Financial loss, data theft, reputation damage, and legal consequences
Enhanced reputation, and cost savings.
Convenience and Increase in social media followers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are some common online scams that individuals should be aware of?
Phone scams
Email scams
Phishing, identity theft, fake websites, and online shopping scams
Lottery scams
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
How can individuals identify and avoid falling victim to online scams?
By responding to every email received
By clicking on every link in emails
By sharing personal information with unknown sources
By being cautious of unsolicited emails, not clicking on suspicious links, verifying the legitimacy of websites, and not sharing personal information with unknown sources.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Bitmap v Vector Images
Quiz
•
KG - University
12 questions
Web II: CSS Positioning
Quiz
•
9th - 12th Grade
9 questions
Examen primer parcial Mantenimiento
Quiz
•
9th - 12th Grade
10 questions
PERFORMANCE TASK 2 |Emtech LC1
Quiz
•
11th Grade
10 questions
R082 Book Cover Assets planning
Quiz
•
7th - 12th Grade
10 questions
Hệ Điều Hành Của Máy Tính
Quiz
•
10th Grade - University
10 questions
paquetes contables lección 1
Quiz
•
11th Grade - Professi...
10 questions
DTJSQuiz
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade