I.T Cyber Ethics

I.T Cyber Ethics

9th - 10th Grade

7 Qs

quiz-placeholder

Similar activities

Studio - U3 - L02.1 Threats to Cyber Security

Studio - U3 - L02.1 Threats to Cyber Security

9th Grade

10 Qs

CSEC ICT June 2019 Paper 1 Part 2

CSEC ICT June 2019 Paper 1 Part 2

9th - 10th Grade

9 Qs

STM BTEC DIT Component 3 -2. Cloud Storage & Computing p142

STM BTEC DIT Component 3 -2. Cloud Storage & Computing p142

9th - 11th Grade

10 Qs

MEDIA LITERACY AND DISINFORMATION

MEDIA LITERACY AND DISINFORMATION

8th - 12th Grade

10 Qs

WHS-Y9-Digital Security L1

WHS-Y9-Digital Security L1

9th Grade

8 Qs

Class 10 Cyber Ethics

Class 10 Cyber Ethics

10th Grade

7 Qs

IT Introduction

IT Introduction

9th - 12th Grade

10 Qs

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

I.T Cyber Ethics

I.T Cyber Ethics

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

HogriderHorse HogriderHorse

Used 383+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Netiqutte For New Users are known as:

Professional

Newbies

Starters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

It is a type of fraud that involves using someone else's identity to steal money or gain other benefits

This type of fraud involves three parties the fraudster, the unsuspecting legitimate shopper and the ecommerce store.

It is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Ethics is a set of __________ Principles that govern the behaviour of a group or Individual.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the Following is NOT rules that users must Follow while in Online:

Do NOT shout

Do not consult FAQ'S

Be Careful With jokes

Avoid Flaming

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Encrypt the Code:"EADGT GVJKEU"

Rules

All the Correct letters are 2 letter Backwards

Eg: C it will Be A

Cyber Ethers

Cyber Fraud

Cyber Control

Cyber Ethics

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What Is Algorithm

The conversion of encrypted data into its original form

It is the method by which information is converted into secret code that hides the information's true meaning

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A _________________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

Digital Signature

Encryption

Digital certificate

Decryption