Search Header Logo

IT_MId Term Examination Form 4_t12025

Authored by Kezia CHARLES

Computers

10th Grade

Used 7+ times

IT_MId Term Examination Form 4_t12025
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is identity theft?

Using someone's personal information to make unauthorized purchases.

Sending advertisements without consent.

Selling stolen software.

Encrypting data for security.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How is propaganda different from computer fraud?

Propaganda spreads false or biased information, while fraud involves unauthorized access to software.

Propaganda spreads biased information to influence opinions, while fraud seeks financial gain.

Both use hacking techniques to steal data.

Fraud and propaganda are identical forms of online theft.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a common way to avoid phishing attacks?

Always reply to unfamiliar emails

Use a debit card for online shopping

Verify email senders and avoid unknown links

Disable antivirus software

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What happens during a Denial-of-Service (DoS) attack?

Users receive too many phishing emails.

Hackers steal passwords directly from servers.

A system is overwhelmed with data, preventing access.

An organization monitors employee emails.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why do organizations protect proprietary data?

To sell it to other companies

To prevent unauthorized access to sensitive information

To avoid advertising conflicts

To share it freely with employees and the public

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can companies prevent electronic eavesdropping?

By monitoring employees' phone calls

By encrypting sensitive communications

By disabling the internet

By ignoring online threats

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an example of software or music piracy?

Buying software from an official website

Using pirated software without permission

Downloading free content legally

Sharing software updates within a company

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?