Chapter 9 & 10

Chapter 9 & 10

9th Grade

11 Qs

quiz-placeholder

Similar activities

ICT - Networks and communication

ICT - Networks and communication

9th Grade

11 Qs

4Q Week3 Review Quiz (Who missed the Quiz ONLY))

4Q Week3 Review Quiz (Who missed the Quiz ONLY))

9th Grade

10 Qs

Arduino

Arduino

7th - 12th Grade

10 Qs

ICT Unit Test Topic : DBMS - Access

ICT Unit Test Topic : DBMS - Access

8th - 12th Grade

15 Qs

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Arduino

Arduino

7th - 9th Grade

15 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Chapter 9 & 10

Chapter 9 & 10

Assessment

Quiz

Computers

9th Grade

Practice Problem

Medium

Created by

Noor Madzlan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data integrity?

A requirement for data to be accurate

A requirement for data to be available only to authorised users

A law that relates to data privacy

A requirement for data to be available

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these are not a type of malware?

Virus

Worm

Logic bomb

Shareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a activity of malware?

phishing

pharming

keylogger

firewall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these might introduce malware?

off the system abruptly

change the filename of a file

downloading a file from the internet

using a USB cable

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the PC is being used by others, which precautions can you take to protect your data?

Use virus checker

Set a password

Use a harddisk defragmenter

Use a back up software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a threat to the security of a system?

Natural disasters

Unauthorised intrusion into the system by an individual

Malicious software entering the system

A file is saved in the directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You will use ___________ to check the identity of the sender of an email

Software update

Anti virus

Firewall

Digital signature

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?