MHS Computing: Y8 Cybersecurity Embedding Homework

MHS Computing: Y8 Cybersecurity Embedding Homework

7th Grade

14 Qs

quiz-placeholder

Similar activities

Computer Networks Assignment

Computer Networks Assignment

6th - 10th Grade

10 Qs

Networks

Networks

7th - 8th Grade

10 Qs

Hardware and Software

Hardware and Software

6th Grade - University

18 Qs

Checkpoint 2 Revision

Checkpoint 2 Revision

7th Grade

16 Qs

Mid Topic Quiz - CyberCrime

Mid Topic Quiz - CyberCrime

6th - 8th Grade

12 Qs

Data and Privacy

Data and Privacy

1st - 10th Grade

10 Qs

Coding Block Vocabulary

Coding Block Vocabulary

7th Grade

13 Qs

Cloud Computing

Cloud Computing

7th - 11th Grade

10 Qs

MHS Computing: Y8 Cybersecurity Embedding Homework

MHS Computing: Y8 Cybersecurity Embedding Homework

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Jules Thompson

Used 5+ times

FREE Resource

14 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the key word?

Noun: Facts and statistics collected together for reference or analysis.

2.

CLASSIFICATION QUESTION

3 mins • 4 pts

Social media companies collect lots of data about their users.

Put these items of data into the correct category.

Groups:

(a) Personal information

,

(b) Content

,

(c) User behaviour

,

(d) Data you have on others

Videos

Shares

Friends' names

School

Friends' locations

Groups

Friends' numbers

Status updates

Images

Name

Pages visited

Likes

Date of Birth

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which law tells companies how they should use and store personal data?

Computer Misuse Act (1990)

Data Protection Act (2018)

Copyright Designs & Patents Act (1988)

Freedom of Information Act (2000)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of methods used by cybercriminals to deceive (trick) individuals into handing over information that they will use for fraudulent purposes.

Phishing

Hacking

Social Engineering

Blagging

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the key word?

verb: control or influence (a person or situation) cleverly or unscrupulously.

6.

HOTSPOT QUESTION

1 min • 1 pt

Click on the three 'red flags' that should warn you this email is a scam.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which social engineering attack involves the attacker watching the victim while they provide sensitive information, for example entering their PIN at a cash machine.

Smishing

Shouldering

Name Generator

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?