APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

12 CSC ATAR - Cyber security

12 CSC ATAR - Cyber security

12th Grade

17 Qs

cyber security Y9

cyber security Y9

9th Grade

10 Qs

Network Security Y8 Starter

Network Security Y8 Starter

9th Grade

15 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Security Risks & Precautions

Security Risks & Precautions

10th - 12th Grade

8 Qs

APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Rebecca Sims

Used 2+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

malware

phishing

keylogging

rogue access point

computer virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that can copy itself and gain access to a computer in an unauthorized way.

malware

phishing

keylogging

rogue access point

computer virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Often attach themselves to legitimate programs and start running independently on a computer.

malware

phishing

keylogging

rogue access point

computer virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique that attempts to trick a user into providing personal information.

malware

phishing

keylogging

rogue access point

computer virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

malware

phishing

keylogging

rogue access point

computer virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

malware

phishing

keylogging

rogue access point

computer virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ is a method of computer access control in which a user is only granted access after successfully presenting several separate pies of evidence to an authentication mechanism.

Multifactor authentication

Encryption

Symmetric encryption

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?