Search Header Logo

ICT-10

Authored by Aji Mathew

Computers

10th - 11th Grade

Used 7+ times

ICT-10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Access to networks by users who are not permitted to access them is called -

unauthorized access.

authorized access.

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Unauthorized users can attempt to gain access to networks - by themselves.

directly

indirectly

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Malware can - messages

show

reprogram

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Malware can - sounds

show

play

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Malware can - systems

delete

reprogram

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Ransomware messages are usually very threatening and distressing for users.

False

True

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Ransomware messages are often written in a way that makes users believe that they must pay quickly.

False

True

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers