APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

Security Risks

Security Risks

9th - 12th Grade

8 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

Impacts of Computing

Impacts of Computing

9th - 12th Grade

15 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Rebecca Sims

Used 2+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

malware

phishing

keylogging

rogue access point

computer virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that can copy itself and gain access to a computer in an unauthorized way.

malware

phishing

keylogging

rogue access point

computer virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Often attach themselves to legitimate programs and start running independently on a computer.

malware

phishing

keylogging

rogue access point

computer virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique that attempts to trick a user into providing personal information.

malware

phishing

keylogging

rogue access point

computer virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

malware

phishing

keylogging

rogue access point

computer virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

malware

phishing

keylogging

rogue access point

computer virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ is a method of computer access control in which a user is only granted access after successfully presenting several separate pies of evidence to an authentication mechanism.

Multifactor authentication

Encryption

Symmetric encryption

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?