Cybersecurity and Global Impacts _code.org U8

Quiz
•
Computers
•
9th Grade
•
Medium
Kristine Cody
Used 64+ times
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
information about an individual that identifies, links, relates, or describes them.
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Computing Innovation
personally identifiable information (PII)
symmetric key encryption
multi-factor authentication
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
phishing
keylogging
malware
rogue access point
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
phishing
keylogging
malware
rogue access point
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
software intended to damage a computing system or to take partial control over its operation
phishing
keylogging
malware
rogue access point
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
STM BTEC DIT Component 3 -1. Communication Technologies p140

Quiz
•
9th - 10th Grade
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
13 questions
Cloud services

Quiz
•
9th - 10th Grade
10 questions
Cryptography

Quiz
•
9th - 12th Grade
15 questions
Cryptography Chap-1

Quiz
•
9th Grade - Professio...
16 questions
Network - Types of Network & Encryption

Quiz
•
8th - 10th Grade
15 questions
AP CSP Exam Vocab Practice

Quiz
•
9th - 12th Grade
15 questions
CS 1.3.1 Encryption

Quiz
•
9th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade