Quiz - Online Safety, Security, Ethics andEtiquette Standards

Quiz - Online Safety, Security, Ethics andEtiquette Standards

12th Grade

15 Qs

quiz-placeholder

Similar activities

Periodic Written Test - Computer

Periodic Written Test - Computer

9th Grade - University

20 Qs

Digital Footprint

Digital Footprint

5th Grade - University

11 Qs

Google Slides Assessment - OPEN SLIDE

Google Slides Assessment - OPEN SLIDE

8th Grade - University

16 Qs

Computer Internet

Computer Internet

4th Grade - University

10 Qs

Recognize Computing Devices

Recognize Computing Devices

9th - 12th Grade

12 Qs

Maintaining and Repairing Computer Systems and Networks

Maintaining and Repairing Computer Systems and Networks

12th Grade

10 Qs

Understanding Cybercrime

Understanding Cybercrime

12th Grade

10 Qs

Quiz - Online Safety, Security, Ethics andEtiquette Standards

Quiz - Online Safety, Security, Ethics andEtiquette Standards

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Michael Manugas

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

It displays unwanted ads when a user is surfing the internet.

2.

FILL IN THE BLANK QUESTION

5 mins • 1 pt

This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and convince them to pay for a fake malware removal tool.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They present themselves as harmless computer programs so that hackers can penetrate your computer without being detected.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It can monitor your keystrokes, read and delete your files, reformat your hard drive, and access your applications.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

These are unwanted emails.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They usually make their way on to a computer via a malicious email attachment or USB stick.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They are often attached to files for download, shared via CDs, DVDs, and USB sticks, or loaded on to computers by opening infected email attachments.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?