Chapter 7

Chapter 7

Professional Development

20 Qs

quiz-placeholder

Similar activities

Evaluación de 2do Periodo Grado 8°

Evaluación de 2do Periodo Grado 8°

Professional Development

20 Qs

Excel for Business Q2

Excel for Business Q2

Professional Development

15 Qs

Microsoft Office Advandces 2016

Microsoft Office Advandces 2016

9th Grade - Professional Development

20 Qs

Computer basics for beginners

Computer basics for beginners

Professional Development

15 Qs

Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik

Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik

1st Grade - Professional Development

20 Qs

Jadi Programmer | Kampung Koding

Jadi Programmer | Kampung Koding

10th Grade - Professional Development

20 Qs

unit test i sem jamia

unit test i sem jamia

Professional Development

20 Qs

Unit 1 lesson 1

Unit 1 lesson 1

University - Professional Development

15 Qs

Chapter 7

Chapter 7

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Peter McDaid

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?