MHS Computing: Y8 Cybersecurity Embedding Homework

MHS Computing: Y8 Cybersecurity Embedding Homework

7th Grade

14 Qs

quiz-placeholder

Similar activities

Ethical, legal, cultural and environmental concerns - MCQs

Ethical, legal, cultural and environmental concerns - MCQs

7th Grade

12 Qs

The impact of ICT on society

The impact of ICT on society

5th - 10th Grade

10 Qs

KS3 Networks

KS3 Networks

7th - 9th Grade

15 Qs

Test50

Test50

7th - 8th Grade

15 Qs

Computer Misuse Act

Computer Misuse Act

7th - 9th Grade

10 Qs

Word of the Day Quizizz

Word of the Day Quizizz

5th Grade - University

12 Qs

Term 6 - Quiz 3

Term 6 - Quiz 3

7th - 9th Grade

11 Qs

CLoud Storage

CLoud Storage

7th Grade

12 Qs

MHS Computing: Y8 Cybersecurity Embedding Homework

MHS Computing: Y8 Cybersecurity Embedding Homework

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Jules Thompson

Used 5+ times

FREE Resource

14 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the key word?

Noun: Facts and statistics collected together for reference or analysis.

2.

CLASSIFICATION QUESTION

3 mins • 4 pts

Social media companies collect lots of data about their users.

Put these items of data into the correct category.

Groups:

(a) Personal information

,

(b) Content

,

(c) User behaviour

,

(d) Data you have on others

Friends' numbers

Likes

Images

School

Pages visited

Shares

Videos

Friends' names

Status updates

Name

Friends' locations

Date of Birth

Groups

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which law tells companies how they should use and store personal data?

Computer Misuse Act (1990)

Data Protection Act (2018)

Copyright Designs & Patents Act (1988)

Freedom of Information Act (2000)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of methods used by cybercriminals to deceive (trick) individuals into handing over information that they will use for fraudulent purposes.

Phishing

Hacking

Social Engineering

Blagging

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the key word?

verb: control or influence (a person or situation) cleverly or unscrupulously.

6.

HOTSPOT QUESTION

1 min • 1 pt

Click on the three 'red flags' that should warn you this email is a scam.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack involves the attacker watching the victim while they provide sensitive information, for example entering their PIN at a cash machine.

Smishing

Shouldering

Name Generator

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?