Search Header Logo

EMPTECH Lesson 2 - STEM 1

Authored by Ronmar Gino

Computers

11th Grade

Used 2+ times

EMPTECH Lesson 2 - STEM 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What is identity theft and how can individuals protect themselves from it?

Safeguarding personal information, using strong passwords, and monitoring financial accounts regularly

Leaving personal documents in public places

Sharing personal information on social media

Using the same password for all accounts

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Explain the concept of phishing in the context of identity theft.

Attackers send physical threats to intimidate individuals into giving up their personal information.

Phishing involves catching fish in a body of water to steal people's identities.

Attackers use advanced encryption techniques to protect individuals' sensitive information.

Attackers impersonate legitimate organizations to trick individuals into providing sensitive information.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What is hacking and how does it differ from ethical hacking?

Ethical hacking is authorized and used to identify security vulnerabilities.

Hacking is used to improve security and ethical hacking is used to cause harm

Hacking and ethical hacking are the same thing

Hacking is a legal activity and ethical hacking is illegal

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Explain the term 'malware' and its role in hacking.

Malware is a legal software used for protecting computer systems

Malware is a term used to describe a type of computer virus

Malware is a type of hardware used for hacking

Malware is malicious software designed to damage or gain unauthorized access to a computer system.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What are the potential impacts of hacking on individuals and organizations?

Increased productivity and improved security.

Financial loss, data theft, reputation damage, and legal consequences

Enhanced reputation, and cost savings.

Convenience and Increase in social media followers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What are some common online scams that individuals should be aware of?

Phone scams

Email scams

Phishing, identity theft, fake websites, and online shopping scams

Lottery scams

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

How can individuals identify and avoid falling victim to online scams?

By responding to every email received

By clicking on every link in emails

By sharing personal information with unknown sources

By being cautious of unsolicited emails, not clicking on suspicious links, verifying the legitimacy of websites, and not sharing personal information with unknown sources.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?