Etech Q3 module 2

Etech Q3 module 2

12th Grade

15 Qs

quiz-placeholder

Similar activities

INTRODUCTION TO COMPUTER SYSTEMS SERVICING

INTRODUCTION TO COMPUTER SYSTEMS SERVICING

12th Grade

10 Qs

Empowerment technologies lesson 1

Empowerment technologies lesson 1

12th Grade

20 Qs

Tecnologìa y comunicacion

Tecnologìa y comunicacion

3rd Grade - Professional Development

20 Qs

IT Dasar

IT Dasar

1st - 12th Grade

15 Qs

Email Etiquette Review

Email Etiquette Review

6th - 12th Grade

15 Qs

Pre-test: On Online searching by Innovative Teaching Ideas)

Pre-test: On Online searching by Innovative Teaching Ideas)

6th - 12th Grade

14 Qs

[POST-TEST] Unit1 - I Love the Internet

[POST-TEST] Unit1 - I Love the Internet

7th - 12th Grade

20 Qs

Ulangan Harian TIK 9

Ulangan Harian TIK 9

9th Grade - University

20 Qs

Etech Q3 module 2

Etech Q3 module 2

Assessment

Quiz

Instructional Technology

12th Grade

Practice Problem

Hard

Created by

ELMA DASIAN

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It displays unwanted ads when a

user is surfing the internet.

malware
spyware
adware
phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there

is a virus on their computer and convince them to pay for a fake malware removal tool.

Deceitware

Rogue security

software

Hoaxware
Fakeware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

Firewall
Worm

Trojan

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

Firewall
Spyware
Trojan
Keylogger

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These are unwanted emails.

garbage
trash
junk
spam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

phishing
ransomware
trojan

worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to

computers by opening infected email attachments.

Pharmers

virus

Phishing

Netiquette

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?