Quiz - Online Safety, Security, Ethics andEtiquette Standards

Quiz - Online Safety, Security, Ethics andEtiquette Standards

12th Grade

15 Qs

quiz-placeholder

Similar activities

BITS AND BYTES - THE FUTURE OF CYBERSECURITY - SENIOR PRELIM

BITS AND BYTES - THE FUTURE OF CYBERSECURITY - SENIOR PRELIM

12th Grade

15 Qs

CM- U1L3 -  Windows OS Security Features

CM- U1L3 - Windows OS Security Features

10th Grade - University

20 Qs

asesmen CP Literasi Digital TP 1 - 6

asesmen CP Literasi Digital TP 1 - 6

12th Grade

20 Qs

Input and Output Devices Challenge

Input and Output Devices Challenge

7th Grade - University

10 Qs

Internet Safety

Internet Safety

8th Grade - University

10 Qs

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

Virtualization Concepts and Differences

Virtualization Concepts and Differences

9th - 12th Grade

11 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Quiz - Online Safety, Security, Ethics andEtiquette Standards

Quiz - Online Safety, Security, Ethics andEtiquette Standards

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Michael Manugas

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

It displays unwanted ads when a user is surfing the internet.

2.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and convince them to pay for a fake malware removal tool.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

These are unwanted emails.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening infected email attachments.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)