STEAM

STEAM

5th Grade

20 Qs

quiz-placeholder

Similar activities

Agentes dañinos para la computadora

Agentes dañinos para la computadora

1st - 6th Grade

17 Qs

六年级TMK

六年级TMK

5th - 6th Grade

16 Qs

empowerment quiz2

empowerment quiz2

1st - 5th Grade

20 Qs

Az operációs rendszer

Az operációs rendszer

5th Grade

19 Qs

Pyhton Input and Output Basics

Pyhton Input and Output Basics

5th Grade

20 Qs

Navegacion por internet

Navegacion por internet

2nd - 6th Grade

18 Qs

Bài 7 Dụng cụ và vật liệu làm thủ công

Bài 7 Dụng cụ và vật liệu làm thủ công

1st - 5th Grade

23 Qs

Introduction to Scratch

Introduction to Scratch

3rd - 5th Grade

15 Qs

STEAM

STEAM

Assessment

Quiz

Computers

5th Grade

Practice Problem

Easy

Created by

Grade5 teacher

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A secret word or phrase that must be used to gain admission into a place is called__________.

program
keyword
password
Virus

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A person who uses his/her expertise to gain access to other people's computers to get information illegally or do damage is a _____.

Analyst
hacker
programmer
explorer

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___ is a method where cyber attackers use files of possible words that might be one's password.

Dictionary searching
Exhaustive searching
Fake Login screen
Phishing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When an attacker uses information about you such as your date of birth, pet's name or street name to guess your password, this is called _____.

dictionary searching
Exhaustive searching
personal knowledge
Fake Login Screen

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Another name for computer security is _______.

cyber-security
computer lock
computer guard
cyber lock

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Firewalls are used to protect our computers against ________.

unauthorized attacks
Virus attacks
Fire attacks
water attacks

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An example of a good password is ____.

A name of a partner or spouse
Name of a child or pet
word that contain multiple random digits
Phone number

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?