
IT group 2 quiz
Authored by Sone TOOOOO COOOl
Information Technology (IT)
9th - 12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
the use of computer systems to distribute information to spread both beneficial and harmful material
Propaganda
Gaslighting
Data Distibution
Cyber Theft
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
________ _____ is when a criminal uses a computerised system to steal a person’s personal information
Cyber theft
Identity Theft
Intellectual Larceny
Persona Larceny
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
personal information that can be stolen when some body commits identity theft include
Credit card information
Date of birth
Address
all of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is electronic eavesdropping?
listening and watching conversations without consent secretly through videotapping
using someone else’s phone with consent
prank calling
asking ur friend to look at their messages with mom
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of this presentation D.O.S. stands for
Disk Operating System
Designation of Service
Denial of service
two/back
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_ _ _ _ _ _ _ _ is when websites and email messages are used to trick you into entering your personal information.
(a)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When someone illegally uses, shares, sells or distributes copies of software or music, this is known as
royalty theft
software borrowing
software/music piracy
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?