
year10

Quiz
•
Computers
•
5th - 12th Grade
•
Hard

Ahmed A Mohamed
Used 1+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
Virus
Worm
Trojan
Ransomware
Key logger
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
Leila clicked on a file in an email attachment. Today when she turned on her computer, it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
Virus
Worm
Trojan
Ransomware
Key logger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
Virus
Worm
Trojan
Ransomware
Key logger
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
An item of malware has installed itself to a computer. It is secretly recording each character that is pressed by the user and sending it to a hacker.
Virus
Worm
Trojan
Ransomware
Key logger
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
Virus
Worm
Trojan
Ransomware
Key logger
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What are the two words used to make the word malware?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where do Computer Trojans orginate from?
Greece
France
Germany
America
UK
8.
FILL IN THE BLANK QUESTION
1 min • 1 pt
I Hold a computer hostage by locking or
encrypting access to it. What am i?
9.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Fill in the Blank
A _________ is a small device that connects
to a computer
Similar Resources on Wayground
14 questions
Cybersecurity

Quiz
•
9th - 11th Grade
6 questions
Computer Threats

Quiz
•
10th Grade
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
10 questions
Keamanan Jaringan dan Akun

Quiz
•
12th Grade
14 questions
The Internet

Quiz
•
6th Grade - Professio...
10 questions
Seguridad informatica

Quiz
•
7th Grade
10 questions
Unit 3 - 2.4.3 -Trojans, Backdoors, and RATs

Quiz
•
12th Grade
12 questions
Danger online G7

Quiz
•
7th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
25 questions
Exploring POV and Unreliable Narrators

Quiz
•
7th Grade
18 questions
Company Logos

Quiz
•
6th - 8th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)

Quiz
•
9th Grade
15 questions
MLA Formatting

Quiz
•
9th Grade
20 questions
Typing Practice

Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
20 questions
Input, Output, Processing or Storage

Quiz
•
5th - 6th Grade