Ethics Security Privacy Vocabulary

Ethics Security Privacy Vocabulary

6th - 8th Grade

25 Qs

quiz-placeholder

Similar activities

Computer Vocabulary

Computer Vocabulary

3rd - 6th Grade

25 Qs

Computer Terms

Computer Terms

6th - 8th Grade

25 Qs

Year 7 Digital Technology

Year 7 Digital Technology

7th - 8th Grade

20 Qs

Input/Output

Input/Output

7th - 8th Grade

20 Qs

GCSE J277 - 1.6.1 - Legal Issues

GCSE J277 - 1.6.1 - Legal Issues

7th Grade

20 Qs

Understanding Computer Hardware

Understanding Computer Hardware

8th Grade - University

20 Qs

Computer Architecture

Computer Architecture

1st - 6th Grade

20 Qs

GCSE Computer Science - Memory Quiz

GCSE Computer Science - Memory Quiz

8th - 10th Grade

25 Qs

Ethics Security Privacy Vocabulary

Ethics Security Privacy Vocabulary

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Madeline J

Used 9+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

Data Filter

Data Converter

Firewall

Conversion Code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Topic are we Learning in this Unit

Technology Ethics

Computer Design

Computer Ethics

Behavior

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.

Lying

Cybercrime

Spoofing

Computer Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copy and Paste is considered Plagiarism?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Does DoS stand For

Inaccessable

Denial of Service

Denial of Station

Deal of Stratta

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

Devastating

Enterprise

Organized

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the process of converting information or data into a code, especially to prevent unauthorized access

Coding

Secrecy

Encryption

Hiding Data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?