
1.5.4 - Starter Task/Cyber Resilience
Authored by Mike Roberts
Computers
11th Grade
Used 16+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Name THREE utility programs (3 points)
Defragmentation
Firewall
Backup
Compression
Anti-virus
Answer explanation
The correct utility programs are Firewall, Backup, and Anti-virus. These programs help protect the system from external threats, secure data, and prevent malware infections.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Name THREE operating system tools (3 points)
User interface
Peripheral device management
User management
File management
Memory management
Answer explanation
The correct operating system tools are User interface, Peripheral device management, and File management.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of data storage technology?
Optical
Magnetic
Solid-state
Quantum
Answer explanation
The correct types of storage are Optical, Magnetic, and Solid-state as they are commonly used for storing data in various devices.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Name FOUR CPU registers (4 points)
Evaluate responses using AI:
OFF
Answer explanation
The correct answer is to name FOUR CPU registers: Program Counter (PC), Memory Address Register (MAR), Memory Data Register (MDR), and Accumulator (ACC).
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Name TWO types of primary storage (4 points)
Evaluate responses using AI:
OFF
Answer explanation
The correct types of primary storage are RAM and ROM.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware will display unwanted pop-up ads? (2 points)
Adware
Spyware
Ransomware
Trojan horse
Answer explanation
Adware is the type of malware that displays unwanted pop-up ads, making it the correct choice in this scenario.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of threat floods servers with useless requests? (1 point)
DDoS Attack
Phishing attack
Ransomware attack
Malware attack
Answer explanation
DDoS Attack floods servers with useless requests, causing them to become overwhelmed and unavailable to legitimate users.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
R081 - LO1 Revision session
Quiz
•
10th - 11th Grade
14 questions
Premiere Pro Panels
Quiz
•
9th - 12th Grade
10 questions
BTEC DIT C3 LAB - Internal Threats
Quiz
•
10th - 11th Grade
10 questions
RO81 LO1 Mood boards
Quiz
•
9th - 11th Grade
15 questions
BTEC IT Unit 1 - D1 Threats to data
Quiz
•
10th - 12th Grade
15 questions
Python Casting and Input
Quiz
•
8th - 11th Grade
16 questions
Components of a computer
Quiz
•
9th - 12th Grade
10 questions
Keamanan JarKom
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade