cybersecurity vocabulary

cybersecurity vocabulary

5th - 6th Grade

30 Qs

quiz-placeholder

Similar activities

Software installation

Software installation

4th - 5th Grade

26 Qs

Computing day Quizizz 2022-2023

Computing day Quizizz 2022-2023

6th Grade

30 Qs

COMPUTER SOFTWARE-REVISION

COMPUTER SOFTWARE-REVISION

6th Grade

25 Qs

Tech Apps Common Assessment #1 Review

Tech Apps Common Assessment #1 Review

6th - 8th Grade

26 Qs

Computer Software

Computer Software

6th Grade - University

25 Qs

Kelas 6 - TIK Bab 4  Internet dan Keamanannya

Kelas 6 - TIK Bab 4 Internet dan Keamanannya

6th Grade

25 Qs

Zararlı Yazılımlar

Zararlı Yazılımlar

6th Grade

28 Qs

OCR Cambridge National ICT LO3

OCR Cambridge National ICT LO3

KG - Professional Development

34 Qs

cybersecurity vocabulary

cybersecurity vocabulary

Assessment

Quiz

Computers

5th - 6th Grade

Medium

CCSS
L.1.6, RI.11-12.9, RL.2.6

+18

Standards-aligned

Created by

Justin Tijerina

Used 63+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

This cipher uses a key number that indicate how much the letters shift - also a salad!

computer virus

cryptography

caesar

hal

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Designed to protect computer users against deliberate attacks and theft of information.

computer miss-use act

computer virus

cyber crime

encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A small but dangerous piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet.

firewall

computer virus

hacking

malware

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The art of Code writing or breaking

cybercrime

trojan

virus

cryptography

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Any illegal activities committed through the use of computers and the internet.

cybercrime

worm

virus

social engineering

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The stealing of secrets stored in digital formats or on computers and IT networks.

spim

spyware

trojan

cyber espionage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.

encryption

firewall

analysis

hacking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?