I.T Cyber Ethics

I.T Cyber Ethics

9th - 10th Grade

7 Qs

quiz-placeholder

Similar activities

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Unit 1 Lesson 1-Digital Citizenship Exit Ticket

Unit 1 Lesson 1-Digital Citizenship Exit Ticket

10th Grade

10 Qs

Computer Ethics and Security

Computer Ethics and Security

6th - 10th Grade

10 Qs

Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Staying Safe on the Internet

Staying Safe on the Internet

10th - 12th Grade

10 Qs

Lab Safety Analogies for the GenCyber Security Principles

Lab Safety Analogies for the GenCyber Security Principles

7th - 12th Grade

10 Qs

CYB: UNIT 1, LESSON 6 QUIZ

CYB: UNIT 1, LESSON 6 QUIZ

9th - 12th Grade

12 Qs

I.T Cyber Ethics

I.T Cyber Ethics

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

HogriderHorse HogriderHorse

Used 386+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Netiqutte For New Users are known as:

Professional

Newbies

Starters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is Phishing?

It is a type of fraud that involves using someone else's identity to steal money or gain other benefits

This type of fraud involves three parties the fraudster, the unsuspecting legitimate shopper and the ecommerce store.

It is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Ethics is a set of __________ Principles that govern the behaviour of a group or Individual.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the Following is NOT rules that users must Follow while in Online:

Do NOT shout

Do not consult FAQ'S

Be Careful With jokes

Avoid Flaming

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Encrypt the Code:"EADGT GVJKEU"

Rules

All the Correct letters are 2 letter Backwards

Eg: C it will Be A

Cyber Ethers

Cyber Fraud

Cyber Control

Cyber Ethics

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What Is Algorithm

The conversion of encrypted data into its original form

It is the method by which information is converted into secret code that hides the information's true meaning

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A _________________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

Digital Signature

Encryption

Digital certificate

Decryption