
9.1 - Computer Crime and Cyber Security
Authored by H Sheriton
Computers
4th - 9th Grade
CCSS covered
Used 321+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems is known as?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an unsolicited electronic message targeting users of instant messaging (IM) and email services?
Spoofing
Spam
Spim
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
Computer Virus
Computer Worm
MyDoom
Malicious Code
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is software?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does malware get onto your computer?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?