Practice - 5 Tasks
Answer the questions below
1fill in blank
easyComplete the sentence to identify a common type of malware.
Intro to Computing
A program that secretly records your keystrokes is called a [1]. Drag options to blanks, or click blank then click option'
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing phishing with malware that records keystrokes.
Thinking ransomware records keystrokes.
✗ Incorrect
A keylogger is a type of malware that records keystrokes to steal information.
2fill in blank
mediumComplete the sentence to explain a phishing attack.
Intro to Computing
Phishing is when attackers try to [1] sensitive information by pretending to be someone trustworthy.
Drag options to blanks, or click blank then click option'
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking phishing encrypts data.
Confusing phishing with backing up data.
✗ Incorrect
Phishing is a trick to steal personal information by pretending to be a trusted source.
3fill in blank
hardFix the error in the description of ransomware.
Intro to Computing
Ransomware is a type of malware that [1] your files and demands payment to unlock them.
Drag options to blanks, or click blank then click option'
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking ransomware deletes files permanently.
Believing ransomware copies files to attackers.
✗ Incorrect
Ransomware encrypts your files, making them inaccessible until you pay a ransom.
4fill in blank
hardFill both blanks to complete the sentence about phishing emails.
Intro to Computing
Phishing emails often [1] to look real and [2] you to click on dangerous links.
Drag options to blanks, or click blank then click option'
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'warn' instead of 'trick' for the second blank.
Using 'ignore' which does not fit the meaning.
✗ Incorrect
Phishing emails pretend to be real and trick you into clicking harmful links.
5fill in blank
hardFill all three blanks to complete the explanation of ransomware behavior.
Intro to Computing
When infected by ransomware, your files are [1] using a secret key, attackers [2] a ransom, and victims must [3] carefully.
Drag options to blanks, or click blank then click option'
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'deleted' instead of 'encrypted' for the first blank.
Confusing 'decide' with 'ignore' for the last blank.
✗ Incorrect
Ransomware encrypts files, attackers demand payment, and victims must decide carefully whether to pay.