
cyber crime & social networking & online documents
Authored by Sara Mohamed
Computers, Instructional Technology, Professional Development
7th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
80 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What law stops people making any malware?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What reason is a hacker likely to try to hack?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a virus?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a trojan horse?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What identifies an email as a phishing scam?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A phishing email is one which:
requests a payment for goods you have not received
offers you products in which you may have no interest
encourages you to click on a link to a fraudulent website
contains abusive and threatening language
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?