IT group 2 quiz

IT group 2 quiz

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

Pursuing a Career in Computing  Quiz

Pursuing a Career in Computing Quiz

10th Grade

15 Qs

ICS: Unit 2 Review

ICS: Unit 2 Review

10th Grade

15 Qs

Lesson 1: System Attacks and External Threats

Lesson 1: System Attacks and External Threats

9th - 12th Grade

15 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

Cyber Security Quiz

Cyber Security Quiz

9th Grade

11 Qs

Cyberthreats Case Study and Ethics Wall

Cyberthreats Case Study and Ethics Wall

10th Grade

9 Qs

ICS: Unit 3 Review

ICS: Unit 3 Review

9th Grade

15 Qs

CK Cyber 1 - 1.2 Personal Digital Security

CK Cyber 1 - 1.2 Personal Digital Security

10th Grade

15 Qs

IT group 2 quiz

IT group 2 quiz

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Easy

Created by

Sone TOOOOO COOOl

Used 5+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 the use of computer systems to distribute information to spread both beneficial and harmful material

Propaganda

Gaslighting

Data Distibution

Cyber Theft

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ _____ is when a criminal uses a computerised system to steal a person’s personal information

Cyber theft

Identity Theft

Intellectual Larceny

Persona Larceny

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

personal information that can be stolen when some body commits identity theft include

Credit card information

Date of birth

Address

all of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is electronic eavesdropping?

listening and watching conversations without consent secretly through videotapping

using someone else’s phone with consent

prank calling

asking ur friend to look at their messages with mom

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of this presentation D.O.S. stands for

Disk Operating System

Designation of Service

Denial of service

two/back

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt


_ _ _ _ _ _ _ _ is when websites and email messages are used to trick you into entering your personal information.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When someone illegally uses, shares, sells or distributes copies of software or music, this is known as

royalty theft

software borrowing

software/music piracy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?