
ICT Quiz 3 Sec 2
Authored by Low Teacher
Computers
KG - 12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following 3 steps protect you from online security hazards?
Install a firewall
Increase your cloud storage quota
Install anti virus/ anti malware
Update operating system security patches to the latest version
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_____ establishes a barrier between your internal network and incoming traffic from the internet in order to block malicious traffic like viruses and hackers (8 letter word no spacing)
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system is known as _____. These include viruses, worms, spyware, ransomware, etc. (7 letter word, no spacing)
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The ransomware that crippled many computer systems worldwide in 2017 is known as _____ (8 letter word, no spacing)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pocket, Diigo, Evernote are examples of online _____ tools
client
server
diagnostic
bookmarking
6.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Social media has _____ settings that limit who can access your profile and what information visitors can see (7 letter word, no spacing)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A blog is a short form for ____
blog builder
bookmarked logs
web log
basic logs
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?