
Computer Crimes
Quiz by Y Cole
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1The use of the computer to create false documentsForgery:30s
- Q2The use of the computer to gain unauthorized access to a computer network or a person's personal computerHacking:30s
- Q3:the use of computer to gain access to a computer or network and illegally prevent other person from gaining access to information and websitesDenial of Service Attack30s
- Q4This is the use of the computer to illegally get personal information from other persons E-mails or by setting up fake websitesPhishing30s
- Q5This is the act of pretending to be someone else by using their personal information. Hackers can use these information gained from your computer to buy or credit goods in your name, withdraw money from your bank account or commit illegal acts which you will be blamed for.Identify Theft30s
- Q6This is the use of a computer to harass, annoy, threaten or intimidate person while online.Cyberstalking30s
- Q7this is the use of computer or other electronic equipment to intercept others person's communications.Electronic eavesdropping30s
- Q8this is the unlawful copying and selling of software like computer games. educational software and operating softwareSoftware piracy30s
- Q9the use of the computer to damage information. This can be done by deleting information, adding false information and hiding informationSabotage30s
- Q10the use of the computer to steal money by transferring information from one place to anotherEmbezzlement30s
