IGCSE Comp Sci - Security revision

Quiz
•
Computers
•
9th - 11th Grade
•
Medium
Mykhailo Shapkin
Used 29+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is
Malicious code installed to redirect users to a fake website
A way of gaining illegal access to a computer system
Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor
Malicious code installed to redirect users to a fake website
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus in comp sci context is
A form of encryption requiring both a public and a private key
A thing that makes your computer cough
Program code that can replicate/copy itself with the intention of
deleting/corrupting data/files or causing the computer to malfunction
Malicious code installed to redirect users to a fake website
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is
Sending legitimate-looking emails to encourage users to give out personal data
The editing of program source code so that it can be exploited or changed for a specific purpose
Playing fishing games on a PC professionally
Used to verify that data comes from a trusted source
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pharming is
Pieces of data which allow detection of web pages viewed by a user and store their preferences
A way of gaining illegal access to a computer system
Playing farming games on a PC semi-professionally
Malicious code installed to redirect users to a fake website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shareware is
Software that a user can download free of charge and use for free forever, no caveats
Software that user can try out for free for a trial period
Used to verify that data comes from a trusted source
Part of Ukrainian national dress (for real though, sounds very similar)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Symmetric encryption is
A form of encryption requiring both a public and a private key
A set of principles set out to regulate use of computers
A way of gaining illegal access to a computer system
A form of encryption using one private key for both sender and recipient
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware / key-logging software is
Software that gathers data by monitoring key presses on user's keyboards
A form of encryption requiring both a public and a private key
Malicious code installed to redirect users to a fake website
Secret type of software that only spies can use
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
Cybersecurity 1

Quiz
•
5th Grade - University
10 questions
Grade 6 Forms in HTML

Quiz
•
6th - 9th Grade
9 questions
Information Security

Quiz
•
9th Grade
10 questions
Security of Data

Quiz
•
11th - 12th Grade
11 questions
J277 - Wireless Networks

Quiz
•
8th - 11th Grade
14 questions
Mobile Devices

Quiz
•
9th - 12th Grade
11 questions
Packet Switching and Encryption

Quiz
•
10th - 12th Grade
15 questions
Cryptography

Quiz
•
10th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade
29 questions
AP CSP Unit 2 Review (Code.org)

Quiz
•
10th - 12th Grade