Intro to Cybersecurity  2.0

Intro to Cybersecurity 2.0

5th - 8th Grade

13 Qs

quiz-placeholder

Similar activities

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

PH 2 : Insert Picture - Drop Cap - Font Setting

PH 2 : Insert Picture - Drop Cap - Font Setting

7th Grade

17 Qs

THE PHOTOSHOP WINDOW

THE PHOTOSHOP WINDOW

7th - 8th Grade

10 Qs

ภัยคุกคามจากการใช้เทคโนโลยีสารสนเทศและการป้องกัน

ภัยคุกคามจากการใช้เทคโนโลยีสารสนเทศและการป้องกัน

7th Grade

10 Qs

Online safety

Online safety

5th Grade

8 Qs

BTEC Theory quiz 1: Networks and Internet

BTEC Theory quiz 1: Networks and Internet

8th - 11th Grade

16 Qs

7.3 representing data + spreadsheet recap

7.3 representing data + spreadsheet recap

8th - 10th Grade

18 Qs

NOIR Data

NOIR Data

8th Grade

15 Qs

Intro to Cybersecurity  2.0

Intro to Cybersecurity 2.0

Assessment

Quiz

Computers

5th - 8th Grade

Medium

Created by

Mary Baez

Used 40+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

What are some examples of personal Information

Your name and address

The menu at Miguel's

Your school name

Your parents' names

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

How can you keep personal information safe?

Only share with people you trust

Share to a tele-marketer

Never post your location

it's okay to share information- sharing is caring

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Media Image

Name at least one type of website where you should be careful putting in your personal information

Evaluate responses using AI:

OFF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is phishing?

Email scams to try and get your personal information

Catching dinner with a rod and reel

When someone asks for your name the first day of school

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Which are examples of MalWare

Google drive

viruses

worms

trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the difference between viruses and worms?

worms can spread without human help and viruses can't

viruses spread without human help and viruses can't

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A Trojan Horse in cybersecurity ?

A large wooden horse full of Greek soldiers

A program that looks safe that can crash your computer

a child's toy you can ride on

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?