0478 5.0 Review

0478 5.0 Review

10th Grade

8 Qs

quiz-placeholder

Similar activities

Standard 3 Vocabulary

Standard 3 Vocabulary

9th - 12th Grade

13 Qs

The internet and its uses

The internet and its uses

10th Grade

10 Qs

5.3 - Web Browsers

5.3 - Web Browsers

10th Grade

10 Qs

Networking

Networking

10th - 12th Grade

10 Qs

GCSE CS Computer Networks

GCSE CS Computer Networks

9th - 12th Grade

10 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Web Components

Web Components

KG - University

12 Qs

Types of Computer

Types of Computer

10th Grade

10 Qs

0478 5.0 Review

0478 5.0 Review

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Robert Morrison

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the type of malware to its description

Self-replicates and damages a system

Spyware

Will encrypt a system until the user pays to unlock it

Worm

Will record user activity, such as keystrokes, and send them back to the hacker

Trojan Horse

infects a large number of systems via a network

Ransomware

Malware code is hidden inside an otherwise legitimate application

Virus

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the signs that an email is likely to be a phishing attack?

Inconsistent or unusual grammar and tone

Email originates from an unofficial domain

The email arrived at an unusual time of day such as very early morning

Links in the email do not go to an official domain

3.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   attack may involve repeatedly trying to guess a password using a large range of possibilities. On the other hand, ​ (b)   relies on tricks and manipulation of people to gain access to a system.

brute force
social engineering
malware
phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology can be used to ensure the security of digital currency?

Fetch-Execute Cycle

Blockchain

Machine Learning

Artificial Intelligence

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cookies can be used for...

Storing usernames and passwords

Remembering customisation preferences

Storing items in a shopping basket

Remembering the IP addresses of popular websites

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does HTML look like?

x = 2

y = 3

z = x + y

int myVar;

myVar = 7;

LDD 45

INC ACC

STO 153

<p>Hello World</p>

7.

DROPDOWN QUESTION

1 min • 1 pt

Web pages are stored on ​ (a)   . To access a web server, the web browser must know the ​ (b)   of the server. These are hard to remember. Instead, the user types a ​ (c)   into the address bar of their browser. This is then sent to a ​ (d)   which responds with the IP address of the web server. The web browser and web server then use ​ (e)   to communicate. The web server sends the page to the browser to display.

web servers
IP address
URL
DNS server
HTTP
MAC address
File Server
HTML
TCP
the internet

8.

OPEN ENDED QUESTION

5 mins • 4 pts

What is the difference between the internet and the world wide web?

In your answer, include an example of one activity which requires the internet but not the world wide web, and one activity which requires the world wide web.

Evaluate responses using AI:

OFF