Search Header Logo

Lesson 2 Quiz - Empowerment Technologies

Authored by Joan Daang

Education

12th Grade

Used 2+ times

Lesson 2 Quiz - Empowerment Technologies
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A form of piracy in which a third party infringes the rights granted to the copyright such as the exclusive use of a work for a set period of time.

2.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Secretly installed malicious software that is intended to monitor user's activity. It has the ability to monitor what you are currently doing and typing through keylogging.

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A piece of code designed to replicate itself and transfer from one computer to another by attaching itself to other files.

5.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

An email-based threat which presents users with different advertising materials and promotional content.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

People who use this scheme aims to steal sensitive information such as, credit card details, and password.

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

This unwanted software has the ability to harm a computer system, hinder performance efficiency, or create a state of nuisance.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?