VIIChapter -2 : Browsing Safely

VIIChapter -2 : Browsing Safely

17 Qs

quiz-placeholder

Similar activities

Animal Systems Interactions

Animal Systems Interactions

9th Grade

15 Qs

ESERCITAZIONE 2 BIOLOGIA

ESERCITAZIONE 2 BIOLOGIA

KG - University

15 Qs

HIASAN PADA BUSANA

HIASAN PADA BUSANA

12th Grade - University

20 Qs

Goethe A2 - Modellsatz 1

Goethe A2 - Modellsatz 1

KG - University

22 Qs

QUIZ- 2 Integral and Vector Calculus (20MA204)

QUIZ- 2 Integral and Vector Calculus (20MA204)

KG - University

12 Qs

Constitution Vocabulary Test #3

Constitution Vocabulary Test #3

KG - University

15 Qs

HW 3/18/25 Geometric Sequences Assignment

HW 3/18/25 Geometric Sequences Assignment

KG - University

20 Qs

6.1 REGLA DE 3 DIRECTA

6.1 REGLA DE 3 DIRECTA

KG - University

16 Qs

VIIChapter -2 : Browsing Safely

VIIChapter -2 : Browsing Safely

Assessment

Quiz

others

Easy

Created by

Lilee Parida

Used 12+ times

FREE Resource

17 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Section
A
B
C

3.

OPEN ENDED QUESTION

30 sec • Ungraded

Roll Number

Evaluate responses using AI:

OFF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you mean by a strong password?
a) It has minimum 8 characters
b) It should contain numbers and special characters and upper and lowercase letters
c) Both option (a) and (b)
d) None of these

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ are like online thieves who steal your personal information and do dishonest things.
a) Gangstar
b) Cybercriminals
c) Pickpocket
d) None of these

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ is an act of harming or harassing someone using information technology in a deliberate manner.
a) Email Spoofing
b) Cybergrooming
c) Cyberbullying
d) Phising

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is the process of befriending children on social media to facilitate online or physical abuse.
a) Email Spoofing
b) Cybergrooming
c) Cyberbullying
d) Phising

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?