Review Quiz Grade V

Review Quiz Grade V

5th Grade

10 Qs

quiz-placeholder

Similar activities

B Words GCSE Computer Science

B Words GCSE Computer Science

1st - 10th Grade

15 Qs

Operating System and Cyber World

Operating System and Cyber World

5th Grade

14 Qs

OS Essentials - Chapter 14 (The IT Professional)

OS Essentials - Chapter 14 (The IT Professional)

KG - University

10 Qs

Kids at Work Challenge

Kids at Work Challenge

3rd - 6th Grade

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Tower heroes

Tower heroes

KG - 9th Grade

13 Qs

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Review Quiz Grade V

Review Quiz Grade V

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Muhammad Alvi

Used 14+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ is a fraudulent action of sending spam emails by imitating to be from any legitimate source.

Ransomware

Phishing

Botnet

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

______________ is a crime that involves a computer and a network.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_________________ may have referred to as information technology security.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________________ is about implementing measures that are designed to stop unauthorized individuals

Confidentiality

Integrity

Availability

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________________ means that authorized individuals are able to access their data whenever they want.

Confidentiality

Integrity

Availability

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ involves maintaining the accuracy, consistency and trustworthiness of data

Confidentiality

Integrity

Availability

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

__________ is the most crucial elements of information security.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers