
Ethics Security Privacy Vocabulary
Authored by Madeline J
Computers
6th - 8th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Data Filter
Data Converter
Firewall
Conversion Code
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What Topic are we Learning in this Unit
Technology Ethics
Computer Design
Computer Ethics
Behavior
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.
Lying
Cybercrime
Spoofing
Computer Attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Copy and Paste is considered Plagiarism?
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What Does DoS stand For
Inaccessable
Denial of Service
Denial of Station
Deal of Stratta
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
Devastating
Enterprise
Organized
Botnet
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
the process of converting information or data into a code, especially to prevent unauthorized access
Coding
Secrecy
Encryption
Hiding Data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?