Formative Assessment MYP 3

Formative Assessment MYP 3

8th Grade

48 Qs

quiz-placeholder

Similar activities

1B-1 PRELIMINARY EXAM (GARMENT CONSTRUCTION 1)

1B-1 PRELIMINARY EXAM (GARMENT CONSTRUCTION 1)

7th Grade - University

45 Qs

Intro Art AV 2022

Intro Art AV 2022

7th - 8th Grade

50 Qs

Adobe Illustrator

Adobe Illustrator

8th - 12th Grade

50 Qs

Network Applications Quiz

Network Applications Quiz

8th Grade

46 Qs

GTT Design & Modeling Semester Review

GTT Design & Modeling Semester Review

8th Grade

43 Qs

Design Pre-Assessment 7-8

Design Pre-Assessment 7-8

7th - 8th Grade

52 Qs

Interior Design Review of 1.01-2.02

Interior Design Review of 1.01-2.02

8th Grade - University

43 Qs

Engineering Vocabulary

Engineering Vocabulary

6th - 8th Grade

44 Qs

Formative Assessment MYP 3

Formative Assessment MYP 3

Assessment

Quiz

Design

8th Grade

Hard

Created by

Sushma Goyal

Used 1+ times

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?

Malware

Formalware

Scams

The Spreading attackers

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords

Farming

Pharming

Phishing

Fishing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following is NOT a type of CyberSecurity Attack?

Worms

Randsomware

Spyware

Password Management

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following is NOT a security threat?

Worms

Hacking

Anti-Virus

Pharming

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unlike a virus, a ________ can spread without any action on the part of the user, and can take advantage of vulnerabilities in a computer's operating system and spread through networks.

Virus

Spyware

Worm

Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ is a type of malware that is designed to secretly monitor a user's online activities, such as browsing history and keystrokes, and send this information back to a third party.

Virus

Spyware

Worm

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?