Ethics and Safety measures in Computing

Ethics and Safety measures in Computing

6th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Computer viruses

Computer viruses

10th Grade

15 Qs

Y9 Hwk Quiz 2 (rise of the bots)

Y9 Hwk Quiz 2 (rise of the bots)

9th Grade

13 Qs

Malware Knowledge Quiz

Malware Knowledge Quiz

9th - 12th Grade

12 Qs

Computer Virus

Computer Virus

7th - 8th Grade

15 Qs

VÍRUS DE COMPUTADORES

VÍRUS DE COMPUTADORES

1st Grade - Professional Development

10 Qs

Computer Litercy Chapter 5

Computer Litercy Chapter 5

6th Grade

14 Qs

gizlilik ve güvenlik

gizlilik ve güvenlik

6th Grade

13 Qs

Ethics and Safety measures in Computing

Ethics and Safety measures in Computing

Assessment

Quiz

Computers

6th - 12th Grade

Hard

Created by

Genius Tactician

Used 102+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the programs called used for searching any information on internet?

Internet Explorer

Social Media

Search Engine

Search Box

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

____________ means buying and selling of goods online.

E-services

E-commerce

E-marketing

E-business

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A malicious program that attacks a computer and harms the users data in many ways.

Spam

Malware

Spyware

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Acceptable behaviour for using a computer and the internet.

Cybercrime

Ethics

Computer Ethics

Ethical Practices

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A person who breaks into a computer system for the purpose of resolving any issue.

Hacker

White Hat Hacker

Black Hat Cracker

Cracker

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A network security program to keep a check on incoming and outgoing information.

Spyware

Firewall

Protector

Adware

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Repeatedly sending the same email to a particular address.

E-mail spoofing

Email flooding

Flooding

E-mail bombing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?