Empowerment Technologies 1st

Empowerment Technologies 1st

11th Grade

10 Qs

quiz-placeholder

Similar activities

Found. of IT: Security Threats - A

Found. of IT: Security Threats - A

9th - 12th Grade

10 Qs

EmTech Q1 Post Test 1

EmTech Q1 Post Test 1

11th Grade

10 Qs

ICT test by Michael

ICT test by Michael

11th Grade

10 Qs

ONLINE SECURITY, SAFETY, AND ETHICS IN ICT

ONLINE SECURITY, SAFETY, AND ETHICS IN ICT

9th - 12th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Fitur-Fitur Web Browser

Fitur-Fitur Web Browser

9th Grade - University

15 Qs

Social Engineering

Social Engineering

11th Grade

12 Qs

G11 - ETech | Rules of Netiquette

G11 - ETech | Rules of Netiquette

11th Grade

10 Qs

Empowerment Technologies 1st

Empowerment Technologies 1st

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Ms. Kookie

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Designed to send you advertisements

adware

pharming

phishing

spyware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A provision that allows Zoe to use Ava's artwork without consent with certain limitations

fair use

copyright

incognito

internet

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It exploits the DNS system

incognito

pharming

adware

keylogger

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A browser feature that allows users to browse the internet without leaving any traces behind.

secret mode

stealth mode

hidden mode

incognito mode

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It provides services for accessing or participating in the internet.

WWW
URL
ISP
HTML

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It is a virus that fool a user into downloading and executing them by pretending to be useful applications

Worm
Trojan horse
Spyware
Adware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage

Spy
Intruder
Saboteur
Hacker

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?