Search Header Logo

TLE - B Module 7 CJ

Authored by Jeremie Garcia

Instructional Technology

7th Grade

Used 4+ times

TLE - B Module 7 CJ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___ addresses the ability to act in a safe and responsible manner on the Internet and

other connected environments.

Cyber Safety

Cyber Crime

Cyber criminals

Cyber bullying

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

-It is trying to be safe on the internet and is the act of maximizing a user's awareness of personal

safety and security risks to private information and property associated with using the internet,

and the self-protection from computer crime.

Cyber safety

cyber crime

cyber criminals

cyber bullying

3.

OPEN ENDED QUESTION

5 mins • 1 pt

Types of cybercrime

Evaluate responses using AI:

OFF

Answer explanation

Email and internet fraud, Identity fraud, Theft of financial or card payment data, Theft and sale of corporate data, Cyberextortion, Ransomware attacks, Cryptojacking, Cyberespionage

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Most cybercrime falls under three main categories

Evaluate responses using AI:

OFF

Answer explanation

Criminal activity that targets

Criminal activity that uses computers to commit other crimes.

Cybercrime that targets computers often involves viruses and other types of malware.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

may infect computers with viruses and malware to damage devices or stop them

working.

Cybercriminals

cybercrime

cybersafety

cyberbullying

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

that stops users using a machine or network, or prevents a business providing a

software service to its customers, is called a Denial-of-Service (DoS) attack.

cyberbullying

cybercrime

cybersafety

cybercriminals

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

that uses computers to commit other crimes may involve using computers or

networks to spread malware, illegal information or illegal images.

cyberbullying

cybercriminals

cybersafety

Cybercrime

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology