Quiz - Online Safety, Security, Ethics andEtiquette Standards

Quiz - Online Safety, Security, Ethics andEtiquette Standards

12th Grade

15 Qs

quiz-placeholder

Similar activities

Understanding Computer Networks

Understanding Computer Networks

12th Grade

10 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

KELAB KOMPUTER SMKS

KELAB KOMPUTER SMKS

12th Grade - University

12 Qs

1stQ Quiz 1 E-Tech

1stQ Quiz 1 E-Tech

12th Grade

20 Qs

DRILL IT ERA

DRILL IT ERA

2nd Grade - University

16 Qs

ONLINE ICT QUIZ, 2024

ONLINE ICT QUIZ, 2024

12th Grade

10 Qs

Quiz 1-15

Quiz 1-15

9th - 12th Grade

15 Qs

ETECH 2ND QUARTER QUIZ

ETECH 2ND QUARTER QUIZ

9th - 12th Grade

20 Qs

Quiz - Online Safety, Security, Ethics andEtiquette Standards

Quiz - Online Safety, Security, Ethics andEtiquette Standards

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Michael Manugas

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

It displays unwanted ads when a user is surfing the internet.

2.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and convince them to pay for a fake malware removal tool.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

These are unwanted emails.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening infected email attachments.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?