In the 1980s, what was required of typewriter owners in Eastern Germany?

Understanding Online Threats and Privacy Concerns

Interactive Video
•
Social Studies, Computers, History
•
10th - 12th Grade
•
Medium

Lucas Foster
Used 2+ times
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
They had to submit all typed documents for approval.
They had to use government-approved typewriters.
They had to pay a tax for owning a typewriter.
They had to register their typewriter with the government.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a modern example of technology being used for surveillance?
Smartphones tracking location
Printers embedding unique identifiers on pages
Televisions recording conversations
Laptops monitoring keystrokes
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which group of online attackers is primarily motivated by financial gain?
Nation-states
Corporate spies
Hacktivists
Online criminals
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What motivates hacktivist groups like Anonymous?
Corporate espionage
Political protest
Personal revenge
Financial gain
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the consequence of the DigiNotar hack?
Exposure of government secrets
Shutdown of internet services
Compromised security certificates
Loss of financial data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are SSL certificates important for websites?
They increase website speed.
They allow for more website traffic.
They provide encryption for secure communication.
They improve website design.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What did the Egyptian secret police use to monitor citizens?
Satellite surveillance
Social media monitoring
A network of informants
A tool called FinFisher
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Digital Conflict and Cybersecurity Challenges

Interactive video
•
10th - 12th Grade
11 questions
Surveillance and Civil Liberties Issues

Interactive video
•
10th - 12th Grade
8 questions
CLEAN : Memory hole: Kashmir news archives vanish

Interactive video
•
10th Grade - University
11 questions
Understanding SS7 Vulnerabilities and Exploits

Interactive video
•
10th - 12th Grade
6 questions
Digital Warfare and Cybersecurity Challenges

Interactive video
•
10th - 12th Grade
11 questions
Understanding the Use of Technology in Terrorism

Interactive video
•
10th - 12th Grade
8 questions
Mikko Hypponen: Three types of online attack

Interactive video
•
11th Grade - University
6 questions
CLEAN : Alarm over Big Brother Turkish Internet cu

Interactive video
•
10th - 12th Grade
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade