Search Header Logo

ICT 1 legal issues

Authored by Mables Agapito

Computers

12th Grade

Used 6+ times

ICT 1 legal issues
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Phishing is a type of cybercrime where attackers attempt to trick individuals into providing sensitive information such as usernames, passwords, and credit card details.

Offering a job opportunity

Asking for help with a computer virus

Sending gifts to individuals

Trick individuals into providing sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Identity theft involves stealing someone's personal information, such as their name, Social Security number, or credit card number, to commit fraud or other crimes.

Using personal information to apply for a job

Borrowing personal information to help someone else

Selling personal information for profit

Stealing personal information to commit fraud or other crimes

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Online fraud refers to any type of fraud scheme that uses the internet to carry out fraudulent activities, such as fake online auctions or investment scams.

True

False

Partially true

Only happens in movies

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Hacking is the unauthorized access, modification, or use of computer systems or networks, often for malicious purposes.

Unauthorized access, modification, or use of computer systems or networks

Modifying computer systems or networks with permission

Using computer systems or networks for legal purposes

Authorized access to computer systems or networks

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Malware is software designed to damage or disrupt computer systems, such as viruses, worms, and ransomware.

Trojans, spyware, and adware

Viruses, worms, and ransomware

Firewalls, antivirus, and encryption

Cookies, cache, and plugins

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Phishing attacks can only occur through email and not through other communication channels like social media or messaging apps.

Depends on the situation

Partially true

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Identity theft can only occur if someone physically steals your wallet or purse.

Only if they have access to your computer

True

False

Only if they have your social security number

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?