CAT G10 M15 AMA Quiz

CAT G10 M15 AMA Quiz

10th Grade

9 Qs

quiz-placeholder

Similar activities

Soal Bab 5

Soal Bab 5

10th Grade

10 Qs

EMAILING 📧 AND CALENDARING 🗓

EMAILING 📧 AND CALENDARING 🗓

10th - 12th Grade

10 Qs

Year 9 ICT Communication using the Internet

Year 9 ICT Communication using the Internet

8th - 10th Grade

13 Qs

Malware Introduction

Malware Introduction

5th - 10th Grade

10 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

Information Privacy

Information Privacy

1st - 12th Grade

10 Qs

Online Scam Vulnerability

Online Scam Vulnerability

3rd Grade - University

10 Qs

ANALISIS DATA

ANALISIS DATA

10th Grade

10 Qs

CAT G10 M15 AMA Quiz

CAT G10 M15 AMA Quiz

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Rene Leus

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

E-communication includes using emails, instant messaging and blogs to send data over the Internet.

True or False?

True

False

2.

OPEN ENDED QUESTION

1 min • 1 pt

List one benefit of e-communication.

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of email service that requires you to install software is called...

Web-based

Software-based

ISP-based

Server-based

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which component of the email refers to the domain of the service provider?

1

2

3

4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which component of the email refers to the type of company?

1

2

3

4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which option will you select to include a copy of the email to other recipients without revealing their email addresses?

1

2

3

8

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is a set of rules for acceptable and ethical behavior when communicating over the Internet.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat is when fraudsters pose as a trustworthy or legitimate person or representative of a company in order to gain access to your personal information?

Pharming

Phishing

Hoax

Spam

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ____ is a virus that copies itself from one computer to another.

Spam

Hoax

Worm

Trojan