Search Header Logo

cyber law

Authored by taylor grace

Computers, Business

9th - 12th Grade

Used 95+ times

cyber law
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Creating a false identity or using someone else's to commit fraud

Cyberpiracy

Cyber proofing

cyber blackmail

cyber germ warfare

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

using a computer to steal digital data

Cyber proofing

Cyberpiracy

Cyber blackmail

cyber germ warfare

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using information obtained by computer to blackmail someone

Cyber proofing

Cyberpiracy

cyber blackmail

Cyber germ warfare

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

transmitting computer viruses to people to destroy their files

cyber proofing

Cyberpiracy

cyber blackmail

Cyber germ warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

using a computer to steal someone's information

Identity theft

phishing

cyber terrorism

cyber vandalism

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

sending emails pretending to be a company to get information from people (like passwords)

identity theft

phishing

cyber terrorism

Cyber vandalism

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

operating a computer to disrupt the national electronic infrastructure

identity theft

phishing

cyber terrorism

cyber vandalism

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?