Viruses & Identity Theft

Viruses & Identity Theft

University

10 Qs

quiz-placeholder

Similar activities

Staying Safe Online

Staying Safe Online

9th Grade - University

15 Qs

White Collar Crime

White Collar Crime

University

13 Qs

S1G3 Editing Practice 1

S1G3 Editing Practice 1

7th Grade - University

8 Qs

Computer Safety

Computer Safety

7th Grade - University

15 Qs

Internet Security

Internet Security

University

10 Qs

Security software

Security software

University

7 Qs

AEP - U8L2 - Protect yourself online

AEP - U8L2 - Protect yourself online

University

7 Qs

Viruses & Identity Theft

Viruses & Identity Theft

Assessment

Quiz

English

University

Hard

CCSS
RI.9-10.4, RI.11-12.8, RF.3.3B

+11

Standards-aligned

Created by

Mr. Adhit

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attacks anti-virus software is called?

Hacker

Resident Extension

Anti-antivirus virus

Piggyback

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program file that installs itself without permission is called?

Virus

Hacker

Host

Anti-antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that copies its code over and destroys the files of the original data is called?

Piggyback

Hacker

Overwriting virus

Resident extension

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who illegally exploits computer hardware and software is named ....

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A computer system that has a virus attached to it is named .. ...

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Tricking people into giving information through email is named . . . .

Tags

CCSS.RI.11-12.8

CCSS.RI.8.7

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A program that gathers personal information is named . . . . .

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?