CAT G10 M15 AMA Quiz

CAT G10 M15 AMA Quiz

10th Grade

9 Qs

quiz-placeholder

Similar activities

Cyber Safety

Cyber Safety

1st - 11th Grade

10 Qs

Programming - Data Types

Programming - Data Types

1st - 10th Grade

10 Qs

Email Software Skills

Email Software Skills

KG - Professional Development

10 Qs

L2 - Social Engineering  KS3

L2 - Social Engineering KS3

9th - 11th Grade

10 Qs

Office 365

Office 365

KG - University

10 Qs

Email

Email

8th - 10th Grade

10 Qs

Pear Deck and Progress Journals

Pear Deck and Progress Journals

1st - 12th Grade

10 Qs

Google Collaboration

Google Collaboration

9th - 12th Grade

11 Qs

CAT G10 M15 AMA Quiz

CAT G10 M15 AMA Quiz

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Rene Leus

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

E-communication includes using emails, instant messaging and blogs to send data over the Internet.

True or False?

True

False

2.

OPEN ENDED QUESTION

1 min • 1 pt

List one benefit of e-communication.

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of email service that requires you to install software is called...

Web-based

Software-based

ISP-based

Server-based

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which component of the email refers to the domain of the service provider?

1

2

3

4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which component of the email refers to the type of company?

1

2

3

4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which option will you select to include a copy of the email to other recipients without revealing their email addresses?

1

2

3

8

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ is a set of rules for acceptable and ethical behavior when communicating over the Internet.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat is when fraudsters pose as a trustworthy or legitimate person or representative of a company in order to gain access to your personal information?

Pharming

Phishing

Hoax

Spam

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ____ is a virus that copies itself from one computer to another.

Spam

Hoax

Worm

Trojan