Search Header Logo

Chapter 5 - Online Protection

Authored by Kelly Linak

Computers

9th - 12th Grade

Used 3+ times

Chapter 5 - Online Protection
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

All of the information online about a person either posted by that person or others, intentionally or unintentionally

Strategic Business Objective

Digital Tattoo 

Digital Footprint

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

A person who secretly gets access to a computer system in order to get information, and cause damage

virus

Phishing

hacker

spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

A piece of software that can spread from one infected computer to another. Can corrupt, steal data on your computer.

Spyware

Virus

Worm

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Short for "Malicious Software"

Malware

Ransomware

Adware

Spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

If it's been a while since your last log-in, you may be asked to input a code that's been sent to you.

Confidentiality

Two Part Passwords

Encryption

Two Factor Authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Unsolicited or undesired electronic messages.

Phishing

Spam

Adware

Malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Software that aims to gather information about a person or organization without their knowledge.

Adware

Spyware

Malware

Ransonware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?