computer security and privacy

computer security and privacy

9th Grade

26 Qs

quiz-placeholder

Similar activities

For you

For you

2nd - 12th Grade

22 Qs

Intro to Computers

Intro to Computers

8th - 10th Grade

23 Qs

Y9 Creative iMedia RO81 Quiz Part 1

Y9 Creative iMedia RO81 Quiz Part 1

9th Grade

21 Qs

Intro - ICT - EPS Class 9 & 10

Intro - ICT - EPS Class 9 & 10

9th - 10th Grade

21 Qs

PTS INFORMATIKA KELAS 9 2024

PTS INFORMATIKA KELAS 9 2024

9th Grade

21 Qs

GEMATMW - Coding Theory

GEMATMW - Coding Theory

6th Grade - University

21 Qs

Electrónica Básica I

Electrónica Básica I

9th - 10th Grade

22 Qs

Sumative susulan dan remedial Grade 9

Sumative susulan dan remedial Grade 9

9th Grade

24 Qs

computer security and privacy

computer security and privacy

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Casondra Simons

Used 284+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it.

active content

cache memory

cookie

spam

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act or instance of making a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup.

cache memory

backup

copyright

encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet.

backup

firewall

cache memory

encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission

encryption

copyright

computer privacy

hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users.

cache memory

active content

firewall

cookie

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law.

copyright

encryption

computer privacy

decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of reconverting the encrypted data into a readable and usable form.

copyright

firewall

decryption

computer security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?