Search Header Logo

Revision 2

Authored by RABAB ZAKI

Computers

6th Grade

Used 5+ times

Revision 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

………………. are the examples of cybersecurity.

  Verify the information you find

Use safe web browsers

   Use strong passwords

All of them

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To stay safe online, you should follow these precautions: ……………….

install anti-virus protection

.  use strong passwords

. use safe web browsers

All of them

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

………………. is the greatest cyber security threat.

Anti-virus

Malware

Spoofing

.  None of them

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

………………. is a type of malware that pretends to be a virus alert.

Browser

Scareware

Spoofing

None of them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copyright includes written, ………………., and web material.

 

video

visual

audio

All of them

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

………………. refers to work that has been granted permission to share by the creator.

 

Copyright

Data libraries

Intellectual property

Creative commons

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Works are considered public domain and no permission is required if the creator has been dead for at least ……………….

50 years

10 years

20 years

30 years

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?