CS - Modules 1 & 2

CS - Modules 1 & 2

12th Grade

23 Qs

quiz-placeholder

Similar activities

Quiz ASJ

Quiz ASJ

12th Grade

20 Qs

TIK 9 - Penggunaan Browser Untuk Akses Internet

TIK 9 - Penggunaan Browser Untuk Akses Internet

11th - 12th Grade

20 Qs

KUIZ TMK TAHUN 4 2018 (MODUL 1/UNIT 2)

KUIZ TMK TAHUN 4 2018 (MODUL 1/UNIT 2)

10th - 12th Grade

20 Qs

Chương 2 - 3

Chương 2 - 3

12th Grade

20 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

TMK TAHUN 5 2018(MODUL 1/ UNIT 1)

TMK TAHUN 5 2018(MODUL 1/ UNIT 1)

10th - 12th Grade

20 Qs

Logika & Pemrograman (ID)

Logika & Pemrograman (ID)

10th Grade - Professional Development

20 Qs

CS - Modules 1 & 2

CS - Modules 1 & 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Leigh-Kathryn Smith

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identity theft, stealing money, stealing private information, controlling private computers.

CyberSecurity

Phishing

Cybercrime

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.

Ransomware

Cybercrime

Cybercrime

CyberSecurity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The study of computational thinking, the thinking humans need to do in order to describe a step-by-step process to a computer.

CyberSecurity

Phishing

Cybercrime

Computer Science

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Internet of Things

Phishing

Data Security

Https

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The usage of deceptive emails and websites to maliciously gather personal information.

Cybercrime

Phishing

CyberSecurity

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.

Cybercrime

Phishing

White Hat Hacking

Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

Black Hat Hacking

CIA Triad

Ransomware

Http

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?