Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

10th Grade

10 Qs

quiz-placeholder

Similar activities

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Q3 M3 POST TEST

Q3 M3 POST TEST

10th Grade

10 Qs

3.6 - Cyber Security

3.6 - Cyber Security

10th Grade

15 Qs

KS3 Malware

KS3 Malware

KG - 12th Grade

10 Qs

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

Cybersecurity Quiz Unit 1 Vocabulary

Cybersecurity Quiz Unit 1 Vocabulary

10th Grade

11 Qs

iGCSE ICT Revision

iGCSE ICT Revision

7th - 10th Grade

14 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Assessment

Quiz

Computers

10th Grade

Medium

Created by

ELVIRA BAD-AN

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A system software that manages computer hardware and software resources, and provides common services for computer programs.

Application Software

Operating System

System Software

Gadget Driver

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What name is given to the person requiring the software?

Organization

User

Client

Company

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It is a program or group of programs designed for end-users.

Application

Antivirus

Windows Store

CD-ROM

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It refers to any intrusive software developed by cybercriminals to steal data and damage or destroy  computers and computer systems.

Application Software

Malware

Antivirus

Gadget Driver

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

If you receive an attachment from someone you don't know, you should never open it.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is attached to an executable file which means it may exist on a system but will not spread until a user opens the infected program.

Virus

Trojan

Spyware

Worms

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

They can replicate themselves and infect multiple computers on a network causing major damage. they often use computer networks to spread slowing down traffic and relying on security failures.

Virus

Trojan

Spyware

Worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?