Search Header Logo

ict prim 5 unite 2

Authored by Ahmed Essa

Computers

5th Grade

Used 1+ times

ict prim 5 unite 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.........................use the internet to break into a computer system

student

hakers

teachers

thieves

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

backup copies of files are created on ...............................

Gps

external hard drive

password

all of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...................such as your name , address , date of birth and your password

PPII

PII

IP

PC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

to keep your data safe use..............................software

anti-virus

browser

word program

power point program

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

......................is considered a weak password

12358977

A123A$%

A12A$%

AW#1234

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................tell you if one of passwords has been stolen

MFA

Pin

password manger

Scam

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the phishing message can be identified by ...................

correct grammar

correct spelling

spelling errors

none of them

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?