
EmTech Q1 M2, Online Safety, Security, Ethics, and Etiquette
Authored by Richard Benigno
Instructional Technology
7th Grade
Used 71+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of file does key logger software typically use to store its recording?
Log Files
Text Files
Virus Files
Data Files
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Raffy is using a technique that tries to take information from the user. He commonly takes things like credit cards, usernames, passwords, and home address. What type of threat is depicted in the scenario?
Fishing
Scam
Spam
Phishing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does spyware infect a computer?
Popups
Theft of personal information
All of the above
Recording web information
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
People who practice identity theft usually go for
Victim's Address
Send users an email
Being able to have another name
Personal information
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The following are tips on how to stay safe online except
Buy the software, do not use pirated ones.
Share your password with anyone.
Avoid visiting untrusted websites.
Add friends you know in real life.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
Spyware
Trojan
Worm
Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Another malicious program that transfers from one computer to another by any type of means.
Spyware
Trojan
Worm
Virus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?