E-safety

E-safety

8th Grade

10 Qs

quiz-placeholder

Similar activities

Computer Virus

Computer Virus

6th - 8th Grade

10 Qs

Safety and Security

Safety and Security

8th Grade

10 Qs

Program komputerowy i przepisy prawa

Program komputerowy i przepisy prawa

8th - 12th Grade

15 Qs

Virus and threats

Virus and threats

8th Grade

10 Qs

IT Theory Revision Part 1

IT Theory Revision Part 1

8th - 10th Grade

10 Qs

Computer ethics & Cybercrime

Computer ethics & Cybercrime

8th - 12th Grade

8 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

E-safety

E-safety

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Noura Elmawardy

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software which can monitor your use of the computer (internet browsing) and key pressed.

pharming

spyware

phishing

hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of programming code/software which can install and replicate itself on to a computer system without the user’s permission.

computer virus

hacking

phishing

pharming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To gain unauthorized access to a computer system without the user knowledge or permission. 

hacking

spam e-mail

computer virus

pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious code installed onto a web server will redirect users to a fake website even though they have typed in a legitimate URL address.

virus

phishing

hacking

pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Email is sent out to recipients from a mailing list. The email could be part of a phishing scam or could be to promote certain products.

spam e-mail

hacking

pharming

spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a software which can monitor your use of the computer (internet browsing) and monitor and log key pressed

spyware

malware

virusware

hardware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the recipient will receive an email which looks legitimate. The email will normally requestthe user to update their details which could be their password or payment details. To update the users details they will have to click on a link which will take them to a fake website.

smishing

spyware

phishing

pharming

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?