0
0
Intro to Computingfundamentals~10 mins

Common threats (malware, phishing, ransomware) in Intro to Computing - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to identify a common type of malware.

Intro to Computing
A program that secretly records your keystrokes is called a [1].
Drag options to blanks, or click blank then click option'
Akeylogger
Bphishing
Cransomware
Dfirewall
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing phishing with malware that records keystrokes.
Thinking ransomware records keystrokes.
2fill in blank
medium

Complete the sentence to explain a phishing attack.

Intro to Computing
Phishing is when attackers try to [1] sensitive information by pretending to be someone trustworthy.
Drag options to blanks, or click blank then click option'
Asteal
Bbackup
Cdelete
Dencrypt
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking phishing encrypts data.
Confusing phishing with backing up data.
3fill in blank
hard

Fix the error in the description of ransomware.

Intro to Computing
Ransomware is a type of malware that [1] your files and demands payment to unlock them.
Drag options to blanks, or click blank then click option'
Adeletes
Bencrypts
Ccopies
Dshares
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking ransomware deletes files permanently.
Believing ransomware copies files to attackers.
4fill in blank
hard

Fill both blanks to complete the sentence about phishing emails.

Intro to Computing
Phishing emails often [1] to look real and [2] you to click on dangerous links.
Drag options to blanks, or click blank then click option'
Apretend
Bwarn
Ctrick
Dignore
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'warn' instead of 'trick' for the second blank.
Using 'ignore' which does not fit the meaning.
5fill in blank
hard

Fill all three blanks to complete the explanation of ransomware behavior.

Intro to Computing
When infected by ransomware, your files are [1] using a secret key, attackers [2] a ransom, and victims must [3] carefully.
Drag options to blanks, or click blank then click option'
Aencrypted
Bdemand
Cdecide
Ddeleted
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'deleted' instead of 'encrypted' for the first blank.
Confusing 'decide' with 'ignore' for the last blank.