Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

8th Grade

50 Qs

quiz-placeholder

Similar activities

EV3 Programmer App

EV3 Programmer App

7th - 8th Grade

51 Qs

KTTX_L02_Khối 07

KTTX_L02_Khối 07

7th - 11th Grade

47 Qs

BAI ON KHOI 5

BAI ON KHOI 5

1st Grade - University

46 Qs

SOALAN TMK

SOALAN TMK

KG - University

46 Qs

ULANGAN HARIAN TEKNIK PENGOLAHAN AUDIO DAN VIDEO

ULANGAN HARIAN TEKNIK PENGOLAHAN AUDIO DAN VIDEO

1st - 12th Grade

50 Qs

Computational Thinking

Computational Thinking

6th - 8th Grade

48 Qs

Ulangan Kelas 8

Ulangan Kelas 8

8th Grade

50 Qs

Tecnología de la información

Tecnología de la información

8th Grade

45 Qs

Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

Assessment

Quiz

Computers

8th Grade

Practice Problem

Easy

Created by

Alaa Al Aloul

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability

Digital Security Risk

Computer Crime

Cybercrime

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Any computer/ ICT-illegal act is classified as:

Crimeware

Computer Crime

Cybercrime

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It refers to online or Internet-based illegal acts

Crimeware

Computer Crime

Cybercrime

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Software used by cyber criminals is called:

Crimeware

Computer Crime

Cybercrime

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It refers to someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action

Hacker

Cracker

Corporate Spy

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A ________________ has the same intent as a cracker but does not have the technical skills and knowledge.

Script Kiddie

Hacker

Corporate Spy

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A ________________ is someone who demands payment to stop an attack on an organization's technology infrastructure.

Cyber Extortionist

Cyber Terrorist

Corporate Spy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?