
Viruses & Identity Theft
Authored by Mr. Adhit
English
University
CCSS covered
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A virus that attacks anti-virus software is called?
Hacker
Resident Extension
Anti-antivirus virus
Piggyback
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program file that installs itself without permission is called?
Virus
Hacker
Host
Anti-antivirus software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A virus that copies its code over and destroys the files of the original data is called?
Piggyback
Hacker
Overwriting virus
Resident extension
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A person who illegally exploits computer hardware and software is named ....
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A computer system that has a virus attached to it is named .. ...
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Tricking people into giving information through email is named . . . .
Tags
CCSS.RI.11-12.8
CCSS.RI.9-10.7
CCSS.RL.11-12.8
CCSS.RL.8.7
CCSS.RL.9-10.7
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A program that gathers personal information is named . . . . .
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?