SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
EDU 03
Technology and
Communication in
Education
Aswani V G
Roll no 29
Physical Science
Phishing and Software Privacy
1) What is phishing?
a) scams through websites
b) scams through emails
c) scams through phone calls
d) scams through text messages
2) Sara finds a message on her phone that she thinks might be a scam. She should:
a) Forward the message to her friends to see if they think it's a scam too.
b) Reply and ask the sender not to send more mail.
c) Inform authoruties
d) Delete the message.
3) When people send you phony emails, pop-up messages, social media messages,
texts, calls, or links to fake websites in order to hook you into giving out your
personal and financial information is?
a) Plagiarizing
b) Skimming
c) Phishing
d) Identity Theft
4) Teens are some of the most frequent targets of identity theft and other scams.
Why?
a) Identity thieves look for “clean” Social Security numbers that haven’t yet
been used to get credit.
b) Thieves want to help teens get student loans for college
c) It will help teens do better in school
d) Identity thieves are just testing teens to see if they will fall for their scamsuni.
5) They may get into your computer or another computer system, including schools, credit card
companies, and other places maintaining personal information.Its called?
a) Hoping
b) Heaving
c)Hacking
d) Heckling
6) What is used to prevent identity theft use one of these on credit card, bank and cell phone
accounts?
a) Combination lock
b) Password
c) A piece of tape to cover up the number
d) A fake name
7) What is a phishing scam?
a) Someone trying to log your keys
b) YOU SPELLED FISHING WRONG SIR!
c) Someone sending you a virus
d) Someone pretending to be a legitimate business
8) What is the most common way to receive a phishing scam?
a) Text message
b) Email
c) Downloading films
d) Unsafe wesbites
9) Which is NOT a phishing feature?
a) sense of urgency
b) addressed to you
c) link to website
d) generic greeting
10) Phishing is?
a) using a fishing pole to catch fish.
b) luring someone into giving out private information.
c) pretending to be someone you're not.
d) being at high risk of attack or harm
11) If you receive a message that your computer has a virus, you should?
a) download the fix immediately!
b) be suspicious because they can't tell if your computer has a virus.
c) send them your credit card information right away to get help!
12) ----- deals with the protection of an individual’s information which is
implemented while using the Internet on any computer or personal device.
a) Digital agony
b) Digital privacy
c) Digital secrecy
d) Digital protection
13) Which of the following do not comes under the three pillars of digital privacy?
a) Information privacy
b) Individual privacy
c) Communication privacy
d) Family privacy
14) Which of the following is not an appropriate solution for preserving privacy?
a) Use privacy-focussed SE
b) Close all logical ports
c) Do not use malicious sites and torrent sites
d) Use VPN
15) Which of the following is not a private Search-engine?
a) Yahoo
b) DuckDuckGo
c) StartPage
d) Wolfram Alpha
16) Which of the following browser is used for Privacy purpose?
a) Chrome
b) Firefox
c) Opera
d) Tor
17) The data transferred between your device & the server is securely _____________
if you’re using VPNs.
a) locked
b) sealed
c) packed
d) encrypted
18) The ____________ transferred between your device & the server is securely
encrypted if you are using VPNs.
a) data
b) virus
c) music files
d) document files

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (19)

Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing
PhishingPhishing
Phishing
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Phishing
PhishingPhishing
Phishing
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Seminar
SeminarSeminar
Seminar
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 

Ähnlich wie EDU03- MCQpdf.pdf

Cybersafety powerpoint presantation.pptx
Cybersafety powerpoint presantation.pptxCybersafety powerpoint presantation.pptx
Cybersafety powerpoint presantation.pptxnexhmiekapllani
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfnisarmca
 
T06 cybersecurity exam 2 Computer Science homework help.docx
T06 cybersecurity exam 2 Computer Science homework help.docxT06 cybersecurity exam 2 Computer Science homework help.docx
T06 cybersecurity exam 2 Computer Science homework help.docx4934bk
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safelyBijoKG2
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxprathamchhabra166
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Ähnlich wie EDU03- MCQpdf.pdf (20)

Cybersafety powerpoint presantation.pptx
Cybersafety powerpoint presantation.pptxCybersafety powerpoint presantation.pptx
Cybersafety powerpoint presantation.pptx
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
T06 cybersecurity exam 2 Computer Science homework help.docx
T06 cybersecurity exam 2 Computer Science homework help.docxT06 cybersecurity exam 2 Computer Science homework help.docx
T06 cybersecurity exam 2 Computer Science homework help.docx
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safely
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
IT for Managers
IT for ManagersIT for Managers
IT for Managers
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx
 

Kürzlich hochgeladen

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Kürzlich hochgeladen (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

EDU03- MCQpdf.pdf

  • 1. EDU 03 Technology and Communication in Education Aswani V G Roll no 29 Physical Science
  • 2. Phishing and Software Privacy 1) What is phishing? a) scams through websites b) scams through emails c) scams through phone calls d) scams through text messages 2) Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it's a scam too. b) Reply and ask the sender not to send more mail. c) Inform authoruties d) Delete the message. 3) When people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information is? a) Plagiarizing b) Skimming c) Phishing d) Identity Theft 4) Teens are some of the most frequent targets of identity theft and other scams. Why? a) Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. b) Thieves want to help teens get student loans for college c) It will help teens do better in school
  • 3. d) Identity thieves are just testing teens to see if they will fall for their scamsuni. 5) They may get into your computer or another computer system, including schools, credit card companies, and other places maintaining personal information.Its called? a) Hoping b) Heaving c)Hacking d) Heckling 6) What is used to prevent identity theft use one of these on credit card, bank and cell phone accounts? a) Combination lock b) Password c) A piece of tape to cover up the number d) A fake name 7) What is a phishing scam? a) Someone trying to log your keys b) YOU SPELLED FISHING WRONG SIR! c) Someone sending you a virus d) Someone pretending to be a legitimate business 8) What is the most common way to receive a phishing scam? a) Text message b) Email c) Downloading films d) Unsafe wesbites 9) Which is NOT a phishing feature? a) sense of urgency b) addressed to you c) link to website d) generic greeting 10) Phishing is? a) using a fishing pole to catch fish.
  • 4. b) luring someone into giving out private information. c) pretending to be someone you're not. d) being at high risk of attack or harm 11) If you receive a message that your computer has a virus, you should? a) download the fix immediately! b) be suspicious because they can't tell if your computer has a virus. c) send them your credit card information right away to get help! 12) ----- deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device. a) Digital agony b) Digital privacy c) Digital secrecy d) Digital protection 13) Which of the following do not comes under the three pillars of digital privacy? a) Information privacy b) Individual privacy c) Communication privacy d) Family privacy 14) Which of the following is not an appropriate solution for preserving privacy? a) Use privacy-focussed SE b) Close all logical ports c) Do not use malicious sites and torrent sites
  • 5. d) Use VPN 15) Which of the following is not a private Search-engine? a) Yahoo b) DuckDuckGo c) StartPage d) Wolfram Alpha 16) Which of the following browser is used for Privacy purpose? a) Chrome b) Firefox c) Opera d) Tor 17) The data transferred between your device & the server is securely _____________ if you’re using VPNs. a) locked b) sealed c) packed d) encrypted 18) The ____________ transferred between your device & the server is securely encrypted if you are using VPNs. a) data b) virus c) music files