placeholder image to represent content

C8 Review Quiz

Quiz by Myran Teasdale

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
38 questions
Show answers
  • Q1
    User awareness of online safety - e.g. not giving personal information to strangers, awareness of cyber-bullying, not arranging to meet online buddies.
    e-safety
    30s
  • Q2
    Unauthorised access to a computer system
    hacking
    30s
  • Q3
    the fraudulent practice of sending emails purporting to be from reputable companies to encourage individuals to reveal personal information, such as passwords and credit card numbers.
    phishing
    30s
  • Q4
    Phishing attacks committed using text messages (SMS).
    smishing
    30s
  • Q5
    a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
    vishing
    30s
  • Q6
    An attack where malicious code is installed on a computer or web server that redirects the user a fake website, with the aim of stealing personal information
    pharming
    30s
  • Q7
    Software that enables a user to obtain personal information about another's computer activities by secretly transmitting data from their computer
    spyware
    30s
  • Q8
    A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
    virus
    30s
  • Q9
    unwanted e-mail (usually of a commercial nature sent out in bulk)
    spam
    30s
  • Q10
    An internet forum where posts are screened for undesirable content
    moderated forum
    30s
  • Q11
    An internet forum where posts are not screened for undesirable content
    unmoderated forum
    30s
  • Q12
    Small text files that are sent to your computer from certain websites. They track your behaviour and transactions.
    cookies
    30s
  • Q13
    Software installed on a computer to record all keystrokes and commands, often used to secretly send personal information to criminals
    key-logging software
    30s
  • Q14
    Part of a computer system that is designed to block unauthorized access to a network
    firewall
    30s
  • Q15
    An older protocol for managing the security of message transmissions on the Internet.
    Secure Sockets Layer
    30s

Teachers give this quiz to your class