CS - Modules 1 & 2

CS - Modules 1 & 2

12th Grade

23 Qs

quiz-placeholder

Similar activities

Testing and Evaluation

Testing and Evaluation

12th Grade

19 Qs

ข้อสอบเก็บคะแนนครั้งที่ 2

ข้อสอบเก็บคะแนนครั้งที่ 2

11th - 12th Grade

20 Qs

Spreadsheet

Spreadsheet

8th Grade - University

20 Qs

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

Siskomdig Harian

Siskomdig Harian

12th Grade

20 Qs

To meet the horizon

To meet the horizon

11th - 12th Grade

20 Qs

Lebih Dekat Dengan Komputer Akuntansi

Lebih Dekat Dengan Komputer Akuntansi

KG - University

20 Qs

PROGRAMMING LANGUAGE QUIZ#1

PROGRAMMING LANGUAGE QUIZ#1

12th Grade

20 Qs

CS - Modules 1 & 2

CS - Modules 1 & 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Leigh-Kathryn Smith

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identity theft, stealing money, stealing private information, controlling private computers.

CyberSecurity

Phishing

Cybercrime

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.

Ransomware

Cybercrime

Cybercrime

CyberSecurity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The study of computational thinking, the thinking humans need to do in order to describe a step-by-step process to a computer.

CyberSecurity

Phishing

Cybercrime

Computer Science

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Internet of Things

Phishing

Data Security

Https

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The usage of deceptive emails and websites to maliciously gather personal information.

Cybercrime

Phishing

CyberSecurity

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.

Cybercrime

Phishing

White Hat Hacking

Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

Black Hat Hacking

CIA Triad

Ransomware

Http

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?