Search Header Logo

PCE Module 2 (QUIZ 2)

Authored by Alou Gonzales

Moral Science

University

Used 11+ times

PCE Module 2 (QUIZ 2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • An expert on a particular program, or one who frequently does work using it, or on it.

  • (Type your answer in ALL lowercase/small letter)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program in which malicious or harmful code is disguised inside some apparently harmless programming or data.

Worms

Denial-of Service

Trojan Horse

Time or Logic Bombs

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

  • It can be transmitted by downloading a program from another computer or can be present on a disk.

  • (Type your answer in ALL lowercase/small letter)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Programs triggered to act when they detect a certain sequence of events, or after a particular period of time elapsed.

Worms

Denial-of Service

Trojan Horse

Time or Logic Bombs

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Other term for “ Friday the 13th virus”

  • (Type your answer in ALL lowercase/small letter)

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

  • This Trojan encrypted the user’s files and demanded a ransom to restore access.

  • (Type your answer in ALL lowercase/small letter)

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

  • This Trojan initially a simple tool for creating botnets.

  • (Type your answer in ALL lowercase/small letter)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?