Edit Game
COMPUTER ETHICS
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public




Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   21  Close
________includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
CYBERBULLYING
What is the last name of your Computer Science teacher? MR. JOHN PAUL T. R______
ROCABO
B__ C___D__ __R What type of software is used to circumvent normal security processes on a computer?
Backdoor
You receive an email from your bank,telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information.
PHISHING
What type of malware is best known for carrying other malware as a payload? W__ __ __
WORM
Who is in the picture?
A HACKER
These are unsolicited emails. S___ ____M
SPAM
You were browsing the web on a questionable website, and now you get a pop-up window stating that if you do not pay $100 within one hour, all files on your computer will be destroyed.what is this an example of? R__N__O__W__R__
Ransomware
Teacher John just installed a new search engine on his laptop. Now whenever he searches the internet, he gets several pop-up windows directing him to buy products. What does T. John have? A___W___R___
ADWARE
TR___J___N H___R___ E What is the name of an application that appears to look like a helpful application but instead does harm to your computer?
Trojan Horse
A combination capital letter, number and symbols/special characters makes your login secure. YES or NO
YES
Passing text thorough a maths algorithm to scramble text is called E___C___Y___T___ ___ N
ENCRYPTION
Accessing the DarkWeb is a Cybercrime. TRUE OR FALSE?
FALSE
A type of malware that wants Money. R___NS__M___A__E
Ransomware
An Antivirus protects you from all attacks. TRUE or FALSE
FALSE
A right granted for an invention is known as a ________. A. COPYRIGHT B. PATENT C. WATERMARK D. TRADEMARK
B. PATENT
Identify this trademark slogan with its appropriate company: "I'm Lovin' It"
McDonald's
_______ is an example of intellectual property? A. Ideas B. Inventions C. Artwork D. All of them
D. All of them
A cyber attack that redirects users to a fake website is known as: P___________
PHARMING
I_______ P _______ The right of individuals and companies to deny or restrict the collection and use of information about them.
INFORMATION PRIVACY
True or False: Always check the validity and reliability of any information you obtain from the Internet
TRUE