EmTech Q1 M2, Online Safety, Security, Ethics, and Etiquette

EmTech Q1 M2, Online Safety, Security, Ethics, and Etiquette

7th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

7th Grade

20 Qs

Seguridad Informatica

Seguridad Informatica

7th Grade

11 Qs

Digital citizenship

Digital citizenship

6th - 8th Grade

10 Qs

395 of the DigiCit!

395 of the DigiCit!

7th - 9th Grade

10 Qs

Digital Technologies Intro 7-8

Digital Technologies Intro 7-8

7th - 8th Grade

16 Qs

Cybersafety and Internet Ethics

Cybersafety and Internet Ethics

7th - 10th Grade

10 Qs

1ESO-Mechanisms

1ESO-Mechanisms

6th - 9th Grade

20 Qs

tecnologias

tecnologias

1st - 10th Grade

10 Qs

EmTech Q1 M2, Online Safety, Security, Ethics, and Etiquette

EmTech Q1 M2, Online Safety, Security, Ethics, and Etiquette

Assessment

Quiz

Instructional Technology

7th Grade

Hard

Created by

Richard Benigno

Used 49+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of file does key logger software typically use to store its recording?

Log Files

Text Files

Virus Files

Data Files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Raffy is using a technique that tries to take information from the user. He commonly takes things like credit cards, usernames, passwords, and home address. What type of threat is depicted in the scenario?

Fishing

Scam

Spam

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spyware infect a computer?

Popups

Theft of personal information

All of the above

Recording web information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who practice identity theft usually go for

Victim's Address

Send users an email

Being able to have another name

Personal information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are tips on how to stay safe online except

Buy the software, do not use pirated ones.

Share your password with anyone.

Avoid visiting untrusted websites.

Add friends you know in real life.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)

Spyware

Trojan

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Another malicious program that transfers from one computer to another by any type of means.

Spyware

Trojan

Worm

Virus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?