Search Header Logo

305 - DAY 5

Authored by Christian Fernandez

Computers

University

305 - DAY 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Is a technical effort to manipulate the expected behavior of network connections and connected systems. It refers to constructive, clever technical work that was not necessarily related to computer systems.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Is an entity or person who uses computers to gain unauthorized access to data or information.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Are standards and practices that influence how people lead their lives.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Are a set of moral standards that govern the use of computers. It is society views about the use of computers, both hardware and software.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Is a legal method of breaching a security system to detect potential security threats.

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

ENUMERATE (1-3) TYPES OF HACKER

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

ENUMERATE (4-6) TYPES OF HACKER

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?