PCE Module 2 (QUIZ 2)

PCE Module 2 (QUIZ 2)

University

13 Qs

quiz-placeholder

Similar activities

Pengantar Etika Lingkungan 2

Pengantar Etika Lingkungan 2

University

11 Qs

The great controversy 2

The great controversy 2

1st Grade - University

15 Qs

Droit des contrat 2

Droit des contrat 2

University

17 Qs

Latihan Soal Kelas 5 Tema 2 Subtema 2 Pembelajaran 6

Latihan Soal Kelas 5 Tema 2 Subtema 2 Pembelajaran 6

11th Grade - Professional Development

10 Qs

current affairs

current affairs

5th Grade - University

16 Qs

CIVIC EDUCATION - 7TH GRADER

CIVIC EDUCATION - 7TH GRADER

University

10 Qs

Ética 2 - Contador

Ética 2 - Contador

University

10 Qs

PPKn Subtema 2

PPKn Subtema 2

1st Grade - Professional Development

10 Qs

PCE Module 2 (QUIZ 2)

PCE Module 2 (QUIZ 2)

Assessment

Quiz

Moral Science

University

Medium

Created by

Alou Gonzales

Used 11+ times

FREE Resource

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • An expert on a particular program, or one who frequently does work using it, or on it.

  • (Type your answer in ALL lowercase/small letter)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program in which malicious or harmful code is disguised inside some apparently harmless programming or data.

Worms

Denial-of Service

Trojan Horse

Time or Logic Bombs

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

  • It can be transmitted by downloading a program from another computer or can be present on a disk.

  • (Type your answer in ALL lowercase/small letter)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Programs triggered to act when they detect a certain sequence of events, or after a particular period of time elapsed.

Worms

Denial-of Service

Trojan Horse

Time or Logic Bombs

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Other term for “ Friday the 13th virus”

  • (Type your answer in ALL lowercase/small letter)

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

  • This Trojan encrypted the user’s files and demanded a ransom to restore access.

  • (Type your answer in ALL lowercase/small letter)

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

  • This Trojan initially a simple tool for creating botnets.

  • (Type your answer in ALL lowercase/small letter)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?