CAT G10 M15 AMA Quiz

CAT G10 M15 AMA Quiz

10th Grade

9 Qs

quiz-placeholder

Similar activities

Outlook Module 1 Vocab

Outlook Module 1 Vocab

10th - 12th Grade

11 Qs

ICDL Recap

ICDL Recap

10th Grade

10 Qs

INTERNET SAFETY

INTERNET SAFETY

10th Grade

10 Qs

Email Basics

Email Basics

10th Grade - Professional Development

10 Qs

Computer Quiz

Computer Quiz

10th Grade

11 Qs

Elektronická pošta

Elektronická pošta

5th - 10th Grade

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Phishing, Spam and Fake websites

Phishing, Spam and Fake websites

7th - 12th Grade

13 Qs

CAT G10 M15 AMA Quiz

CAT G10 M15 AMA Quiz

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Rene Leus

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

E-communication includes using emails, instant messaging and blogs to send data over the Internet.

True or False?

True

False

2.

OPEN ENDED QUESTION

1 min • 1 pt

List one benefit of e-communication.

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of email service that requires you to install software is called...

Web-based

Software-based

ISP-based

Server-based

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which component of the email refers to the domain of the service provider?

1

2

3

4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which component of the email refers to the type of company?

1

2

3

4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which option will you select to include a copy of the email to other recipients without revealing their email addresses?

1

2

3

8

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is a set of rules for acceptable and ethical behavior when communicating over the Internet.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat is when fraudsters pose as a trustworthy or legitimate person or representative of a company in order to gain access to your personal information?

Pharming

Phishing

Hoax

Spam

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ____ is a virus that copies itself from one computer to another.

Spam

Hoax

Worm

Trojan