This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Online Security

| See more in IT Security

CEIS - Etech Activity Quiz for ABM, HUMMS and STEM

Created Date 12.02.18
Last Updated 12.03.18
Viewed 194 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • A term used to describe actions taken by someone to gain unauthorized access to a computer.
  • These are cyber criminals who gain access to your computer
  • Software that intends to cause unauthorized harm to a computer or network.
  • It does not need to attach itself to an existing program to replicate itself.
  • Fake emails, text messages and websites are examples of?
  • It is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the rest
  • It is one of the more common methods of both sending information out and collecting it from unsuspecting people.
  • The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through thing
  • Piece of equipment used to increase, maintain, or improve functional capabilities of individuals with disabilities.
  • Type of Assistive Technology (AT) that doesn't require much training, may be less expensive and does not have complex or mechanical features.
  • Type of AT that may have some complex features, may be electronic or battery operated, may require some training to learn how to use.
  • Most complex type of AT and have digital or electronic components, may be computerized, will likely require training and effort to learn