
Online Threats
Authored by Aida Plazzotta
Computers
8th Grade
Used 32+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
10 sec • 1 pt
WHICH ARE THE PERSONAL DETAILS?
Shoe size
Favourite dessert
date of birth
home address
2.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
WHICH IS A VULNERABILITY FOR YOUR COMPUTER?
Basic keyboard
Weak password
Being placed by a TV set
lack of antivirus software
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
TROJAN is a harmful software that is disguised as
an apple
a toy
a normal file
a mouse
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which harmful software is sent by email and make copies of itself and spread on its own?
Photoshop
Worm
Paint it!
Scratch
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
VIRUSES spread to all computers in a network
TRUE
FALSE
MAYBE
6.
OPEN ENDED QUESTION
30 sec • Ungraded
What is a cyber criminal?
Evaluate responses using AI:
OFF
Answer explanation
Cyber criminal is a person who uses technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data that could help them to generate financial gains for themselves.
7.
MULTIPLE SELECT QUESTION
10 sec • 1 pt
These are types of threats for a computer...
MALWARE
RUNWARE
ENGINEERING
SOCIAL ENGINEERING
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?