
Ethics and Safety measures in Computing
Authored by Genius Tactician
Computers
6th - 12th Grade
Used 107+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What are the programs called used for searching any information on internet?
Internet Explorer
Social Media
Search Engine
Search Box
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
____________ means buying and selling of goods online.
E-services
E-commerce
E-marketing
E-business
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A malicious program that attacks a computer and harms the users data in many ways.
Spam
Malware
Spyware
Trojan Horse
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Acceptable behaviour for using a computer and the internet.
Cybercrime
Ethics
Computer Ethics
Ethical Practices
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A person who breaks into a computer system for the purpose of resolving any issue.
Hacker
White Hat Hacker
Black Hat Cracker
Cracker
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A network security program to keep a check on incoming and outgoing information.
Spyware
Firewall
Protector
Adware
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Repeatedly sending the same email to a particular address.
E-mail spoofing
Email flooding
Flooding
E-mail bombing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?