
C8 Review Quiz
Quiz by Myran Teasdale
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
38 questions
Show answers
- Q1User awareness of online safety - e.g. not giving personal information to strangers, awareness of cyber-bullying, not arranging to meet online buddies.e-safety30s
- Q2Unauthorised access to a computer systemhacking30s
- Q3the fraudulent practice of sending emails purporting to be from reputable companies to encourage individuals to reveal personal information, such as passwords and credit card numbers.phishing30s
- Q4Phishing attacks committed using text messages (SMS).smishing30s
- Q5a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account informationvishing30s
- Q6An attack where malicious code is installed on a computer or web server that redirects the user a fake website, with the aim of stealing personal informationpharming30s
- Q7Software that enables a user to obtain personal information about another's computer activities by secretly transmitting data from their computerspyware30s
- Q8A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying datavirus30s
- Q9unwanted e-mail (usually of a commercial nature sent out in bulk)spam30s
- Q10An internet forum where posts are screened for undesirable contentmoderated forum30s
- Q11An internet forum where posts are not screened for undesirable contentunmoderated forum30s
- Q12Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.cookies30s
- Q13Software installed on a computer to record all keystrokes and commands, often used to secretly send personal information to criminalskey-logging software30s
- Q14Part of a computer system that is designed to block unauthorized access to a networkfirewall30s
- Q15An older protocol for managing the security of message transmissions on the Internet.Secure Sockets Layer30s