Hacking
Stealing online identity
Spreading computer viruses
All of the above
Online harassment
Online shopping
Posting on social media
Sending emails
A type of cyber attack
Creating strong passwords
Building computer networks
Creating firewalls
A type of computer virus
Encrypting personal files
Sending spam emails
Creating online backups
Illegally accessing someone's online account
Copying someone's offline identity card
Selling counterfeit products online
None of the above
Manipulating people to reveal sensitive information
Creating social media profiles
Developing mobile applications
Building secure websites
A type of computer virus
Using computers for mining cryptocurrency
Sending unwanted messages
Downloading illegal software
A security barrier for network connections
A computer operating system
A type of cyber attack
A hardware component of a computer
Creating strong passwords
Browsing the internet
Unauthorized access to computer systems
Installing software updates
Sending unsolicited messages
Downloading legal files
Creating strong passwords
Updating social media status
A program that replicates itself and infects a computer
A computer hardware component
A type of malware
Creating backups of personal files
Using computers for online shopping
Intentionally hurting or threatening others online
Downloading legal software
Accessing social media accounts
Unauthorized access to computer systems
Creating online backups
Sending emails
Updating software applications
Malicious software designed to harm computers
Creating secure networks
Using mobile banking applications
Sending text messages
Persistent unwanted online attention
Using search engines
Browsing social media profiles
Downloading legal files
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.