ICT 1 legal issues

ICT 1 legal issues

12th Grade

15 Qs

quiz-placeholder

Similar activities

fnaf sister location

fnaf sister location

4th Grade - University

10 Qs

Formatif Blocly games

Formatif Blocly games

12th Grade

20 Qs

Random stuff

Random stuff

KG - Professional Development

12 Qs

Coding Basics SC-1

Coding Basics SC-1

7th - 12th Grade

20 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

Basics of spreadsheet

Basics of spreadsheet

12th Grade

15 Qs

Level 2 Digital Technologies

Level 2 Digital Technologies

8th Grade - Professional Development

18 Qs

ICT 1 legal issues

ICT 1 legal issues

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Mables Agapito

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Phishing is a type of cybercrime where attackers attempt to trick individuals into providing sensitive information such as usernames, passwords, and credit card details.

Offering a job opportunity

Asking for help with a computer virus

Sending gifts to individuals

Trick individuals into providing sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Identity theft involves stealing someone's personal information, such as their name, Social Security number, or credit card number, to commit fraud or other crimes.

Using personal information to apply for a job

Borrowing personal information to help someone else

Selling personal information for profit

Stealing personal information to commit fraud or other crimes

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Online fraud refers to any type of fraud scheme that uses the internet to carry out fraudulent activities, such as fake online auctions or investment scams.

True

False

Partially true

Only happens in movies

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hacking is the unauthorized access, modification, or use of computer systems or networks, often for malicious purposes.

Unauthorized access, modification, or use of computer systems or networks

Modifying computer systems or networks with permission

Using computer systems or networks for legal purposes

Authorized access to computer systems or networks

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Malware is software designed to damage or disrupt computer systems, such as viruses, worms, and ransomware.

Trojans, spyware, and adware

Viruses, worms, and ransomware

Firewalls, antivirus, and encryption

Cookies, cache, and plugins

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Phishing attacks can only occur through email and not through other communication channels like social media or messaging apps.

Depends on the situation

Partially true

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Identity theft can only occur if someone physically steals your wallet or purse.

Only if they have access to your computer

True

False

Only if they have your social security number

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?