ASSESSMENT

ASSESSMENT

11th Grade

10 Qs

quiz-placeholder

Similar activities

Data Integrity and Security Review

Data Integrity and Security Review

11th Grade

10 Qs

MTA 98-368 STUDY GUIDE

MTA 98-368 STUDY GUIDE

11th Grade - Professional Development

9 Qs

EMTECH Q2 M2 Web page design using templates and online WYSIWYG

EMTECH Q2 M2 Web page design using templates and online WYSIWYG

11th Grade

15 Qs

Empowerment Technologies Lesson 6 Quiz

Empowerment Technologies Lesson 6 Quiz

11th Grade

10 Qs

Computer Literacy (Beginners)

Computer Literacy (Beginners)

1st Grade - Professional Development

10 Qs

Sistema Informático

Sistema Informático

10th Grade - Professional Development

15 Qs

Informatika_Sistem Komputer

Informatika_Sistem Komputer

1st - 12th Grade

10 Qs

Microsoft

Microsoft

1st Grade - Professional Development

15 Qs

ASSESSMENT

ASSESSMENT

Assessment

Quiz

Instructional Technology

11th Grade

Hard

Created by

deserie melicor

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Alyssa is having a problem because his files were corrupted. He discovered that most of his folders were replicated.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Pauline was asked to pay a certain amount of money for her to retrieve her files. Pauline might be a victim of ______.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Karylle found a good application and she installed it on her computer. But after the installation some of her files were deleted.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

James is receiving several irrelevant messages every day and his e-mail account has become almost unusable.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The network servers of KNCHS stopped to respond and it was found out that much of the systems' memory was consumed by the malicious software. What kind of malware is this?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Jikki is using a technique that tries to take information from the user. She commonly takes things like credit cards, usernames, passwords, and home addresses using a fake website. What type of threat is depicted in the scenario?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is the use of works protected by copyright law without permission for a usage where such permission is required.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?