Search Header Logo

ICT\\\

Authored by Aru Maitpassova

Other, Arts

12th Grade

Used 1+ times

ICT\\\
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.      Which of the following are common behaviors of computer viruses?   I. Self-replication;  II. Infliction of physical damage to the computer's hardware;  III Unwarranted file removal

I and II only

   II and III only

I and III only

      I, II, and III

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.    Which of the following computer attack methods does not require a hardware or software tool?

  Port scanning

Social engineering

    Spoofing

  Packet sniffing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.    Attacking a computer by sending it an excessive number of email messages is known as

   Smurfing

      Spoofing

Spamming

    Pinging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the most common applications of encryption is transmitting data securely over the Web is

the Secure Socket Layer (SSL

    a Trojan horse

e-mail

    a simple substitution code

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.    Which encryption method uses a pair of digital keys?

   Active-X

SLL

S-HTTP

Public key encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does store data permanently (even after the computer is turned off)?

Motherboard

   Microprocessor

    Power supply

Disk drives

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.      What does transfer data from storage devices to the motherboard?

Motherboard

Drive Electronics) cable

1.    IDE (Integrated

Power supply

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?