Banzai Review

Banzai Review

5th Grade

14 Qs

quiz-placeholder

Similar activities

Code.org Course E: Sprites

Code.org Course E: Sprites

3rd - 5th Grade

10 Qs

PowerPoint

PowerPoint

5th - 6th Grade

10 Qs

Windows Quick Keys

Windows Quick Keys

2nd - 8th Grade

10 Qs

End of the Year Review!

End of the Year Review!

3rd - 5th Grade

19 Qs

DT Grade 5 3D design revision

DT Grade 5 3D design revision

5th - 6th Grade

12 Qs

Safer Internet 2019

Safer Internet 2019

3rd - 7th Grade

10 Qs

Device Care

Device Care

2nd - 5th Grade

11 Qs

mincraft pro

mincraft pro

KG - Professional Development

12 Qs

Banzai Review

Banzai Review

Assessment

Quiz

Instructional Technology

5th Grade

Medium

Created by

Mary Ann Sanderson

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

DRAG AND DROP QUESTION

1 min • 1 pt

Software designed to damage a computer or phone is ​ ​ (a)  

malware
SSL certificate
Browser
brute force attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wifi is secure when ​

has a password

has an SSL certificate

has security questions

has been wiped

3.

DRAG AND DROP QUESTION

1 min • 1 pt

A website has an ​ (a)   when you see (b)   at the beginning of the website.

SSL certificate
https://
www.
badge
abouts us shown

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malicious adware?

exposes you to catfishing.

Install viruses onto your device, show you inappropriate ads, or show you excessive ads online.

Installs software thatlocks your computer till a sum of money is paid.

A software that protects you from hackers.

5.

DROPDOWN QUESTION

1 min • 1 pt

​ (a)   is the type of software that locks your device until you pay a hacker to gain access again?

Ransomware
Bribeware
Kidnapware
Hostageware

6.

DRAG AND DROP QUESTION

1 min • 1 pt

If you give someone ​ (a)   to your device, they can control it through another phone or computer.

remote access
distant access
control priviledge
distance privilege
control privilege

7.

DRAG AND DROP QUESTION

1 min • 1 pt

Sometimes a hacker is able to force their way into a company's system, exposing sensitive information like passwords, email addresses, or credit card numbers. What is the term for this situation?​ (a)  

A security breach
a hacka attack a data crisis
a system raid
a hack attack
a data crisis

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?