Cybersecurity/ Coding Quiz Kwamesiah

Cybersecurity/ Coding Quiz Kwamesiah

12th Grade

9 Qs

quiz-placeholder

Similar activities

Intro to Class - Syllabus Quiz

Intro to Class - Syllabus Quiz

9th - 12th Grade

12 Qs

1.4 Online and Mobile Banking

1.4 Online and Mobile Banking

9th - 12th Grade

8 Qs

Compare Mixed Fractions

Compare Mixed Fractions

4th Grade - University

8 Qs

CHS Advanced math FAQ

CHS Advanced math FAQ

11th - 12th Grade

10 Qs

Quarter 4 (half-way) review.

Quarter 4 (half-way) review.

9th - 12th Grade

9 Qs

Hari 3 - Kuis Coding & Perkenalan AI_Muhammad Nur Akbar

Hari 3 - Kuis Coding & Perkenalan AI_Muhammad Nur Akbar

12th Grade

10 Qs

Script Testing

Script Testing

11th - 12th Grade

10 Qs

Hari 3 - Kuis Coding & Perkenalan AI

Hari 3 - Kuis Coding & Perkenalan AI

6th - 12th Grade

11 Qs

Cybersecurity/ Coding Quiz Kwamesiah

Cybersecurity/ Coding Quiz Kwamesiah

Assessment

Quiz

Mathematics

12th Grade

Medium

CCSS
RI.11-12.8, RI.8.7, RI.9-10.7

+2

Standards-aligned

Created by

Josiah Ampofo

Used 4+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is cybersecurity?

The practice of protecting computers and networks from attacks

The study of ancient encryption methods

A type of physical security for buildings

The process of creating computer games

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What does the term "phishing" refer to in cybersecurity?

A technique to catch fish using the internet

Sending emails to people asking for sensitive information

A way to protect your computer from viruses

The process of hacking into a website

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is a strong password?

MyPet'sName

12345678

#J8&n3$kL!

password123

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Media Image

What is malware? (Bonus)

The process of backing up data

A hardware device used to filter network traffic

Any software intentionally designed to cause damage

A type of software used to protect against cyber attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is a common method to protect your online accounts?

Enabling two-factor authentication

Writing your passwords down on paper

Sharing your passwords with friends

Using the same password for all accounts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What should you do if you receive an email from an unknown sender with an attachment?

Forward the email to your friends

Reply to the sender asking for more information

Open the attachment to see what it is

Delete the email immediately

Tags

CCSS.RI.11-12.8

CCSS.RI.8.7

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is <Coding> ?

Python lessons Online

Algorithm for coding

Set of Instructions for Computers

Rewiring the CPU to do a task

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is not a Key Concept in Coding?

Programming Languages

Syntax Error

Bugging

Loops

9.

FILL IN THE BLANK QUESTION

1 min • 3 pts

Media Image

Name one Real World Applications form the 5 given(CAPS ONLY & NO SPACING)