Search Header Logo

5-2a Malware

Authored by KEDRAL TIMMONS

Computers

9th - 12th Grade

5-2a Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Recall that malware, short for _________ software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.

malicious

malfuctioning

miscellaneous

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other Internet services.

Adware

Ransomeware

Rootkit

Spyware

Tupperware

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money.

Adware

Ransomeware

Rootkit

Spyware

Tupperware

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.

Adware

Ransomeware

Rootkit

Spyware

Tupperware

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Adware

Ransomeware

Rootkit

Spyware

Tupperware

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.

Adware

Ransomeware

Rootkit

Spyware

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.

Virus

Ransomeware

Rootkit

Spyware

Trojan Horse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?