
SHS_Empowerment Technologies_MELC#2_QUIZ2
Authored by Paolo Borja
Computers
11th - 12th Grade
Used 25+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It is designed to send you advertisements
virus
rogue
keylogger
adware
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It sends an official-looking email and is designed to steal sensitive personal information.
spyware
phishing
pharming
trojan
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It is a browser feature that is synonymous to "private" browsing.
cognito
incognito
private
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It replicates and can transfer from one computer to another.
virus
keylogger
adware
pharming
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It exploits the DNS (domain name service) system.
virus
keylogger
adware
pharming
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It runs in the background and monitors what you are doing.
malware
spyware
adware
phishing
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It disguised as a useful program but is not.
virus
keylogger
rogue
trojan
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?