MHS Computing: Y8 Cybersecurity Embedding Homework

MHS Computing: Y8 Cybersecurity Embedding Homework

7th Grade

14 Qs

quiz-placeholder

Similar activities

Ethical, legal, cultural and environmental concerns - MCQs

Ethical, legal, cultural and environmental concerns - MCQs

7th Grade

12 Qs

The impact of ICT on society

The impact of ICT on society

5th - 10th Grade

10 Qs

KS3 Networks

KS3 Networks

7th - 9th Grade

15 Qs

Staying safe online 3: hacking and DoS attacks

Staying safe online 3: hacking and DoS attacks

7th Grade

9 Qs

Year 8 homework 1 - E-Safety

Year 8 homework 1 - E-Safety

7th Grade

11 Qs

Y8 Recap

Y8 Recap

7th - 9th Grade

10 Qs

Cyber Crime Lesson 2

Cyber Crime Lesson 2

7th Grade

17 Qs

ICT & The Law

ICT & The Law

7th Grade

10 Qs

MHS Computing: Y8 Cybersecurity Embedding Homework

MHS Computing: Y8 Cybersecurity Embedding Homework

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Jules Thompson

Used 5+ times

FREE Resource

14 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the key word?

Noun: Facts and statistics collected together for reference or analysis.

2.

CLASSIFICATION QUESTION

3 mins • 4 pts

Social media companies collect lots of data about their users.

Put these items of data into the correct category.

Groups:

(a) Personal information

,

(b) Content

,

(c) User behaviour

,

(d) Data you have on others

School

Friends' numbers

Date of Birth

Images

Name

Likes

Friends' locations

Shares

Groups

Status updates

Videos

Pages visited

Friends' names

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which law tells companies how they should use and store personal data?

Computer Misuse Act (1990)

Data Protection Act (2018)

Copyright Designs & Patents Act (1988)

Freedom of Information Act (2000)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of methods used by cybercriminals to deceive (trick) individuals into handing over information that they will use for fraudulent purposes.

Phishing

Hacking

Social Engineering

Blagging

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the key word?

verb: control or influence (a person or situation) cleverly or unscrupulously.

6.

HOTSPOT QUESTION

1 min • 1 pt

Click on the three 'red flags' that should warn you this email is a scam.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack involves the attacker watching the victim while they provide sensitive information, for example entering their PIN at a cash machine.

Smishing

Shouldering

Name Generator

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?