APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

9th - 12th Grade

12 Qs

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

Cybersecurity and Global Impacts _code.org U8

Cybersecurity and Global Impacts _code.org U8

9th Grade

12 Qs

Part C Unit 10 Practice Exam

Part C Unit 10 Practice Exam

9th - 12th Grade

10 Qs

APCSP IOC-2.C Cybersecurity Threats

APCSP IOC-2.C Cybersecurity Threats

9th - 12th Grade

15 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

AP Computer Science Unit 10

AP Computer Science Unit 10

9th - 12th Grade

12 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

9th - 12th Grade

12 Qs

APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Rebecca Sims

Used 2+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

malware

phishing

keylogging

rogue access point

computer virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that can copy itself and gain access to a computer in an unauthorized way.

malware

phishing

keylogging

rogue access point

computer virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Often attach themselves to legitimate programs and start running independently on a computer.

malware

phishing

keylogging

rogue access point

computer virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique that attempts to trick a user into providing personal information.

malware

phishing

keylogging

rogue access point

computer virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

malware

phishing

keylogging

rogue access point

computer virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

malware

phishing

keylogging

rogue access point

computer virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ is a method of computer access control in which a user is only granted access after successfully presenting several separate pies of evidence to an authentication mechanism.

Multifactor authentication

Encryption

Symmetric encryption

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?