
Lesson 2 Quiz - Empowerment Technologies
Authored by Joan Daang
Education
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
A form of piracy in which a third party infringes the rights granted to the copyright such as the exclusive use of a work for a set period of time.
(a)
2.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
Secretly installed malicious software that is intended to monitor user's activity. It has the ability to monitor what you are currently doing and typing through keylogging.
(a)
3.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
A malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
(a)
4.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
A piece of code designed to replicate itself and transfer from one computer to another by attaching itself to other files.
(a)
5.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
An email-based threat which presents users with different advertising materials and promotional content.
(a)
6.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
People who use this scheme aims to steal sensitive information such as, credit card details, and password.
(a)
7.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
This unwanted software has the ability to harm a computer system, hinder performance efficiency, or create a state of nuisance.
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?