Search Header Logo

Q2 E-Tech Newton (WISE Test)

Authored by Earl Ortiz

Computers

12th Grade

Used 1+ times

Q2 E-Tech Newton (WISE Test)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A Virus is a self-replicating code that infects applications and can cause data theft, DDoS or ransomware attacks

B: A worm is a standalone program that spread rapidly and can execute damage to systems by deleting files, creating botnets, or consuming bandwidth.

W: Only statement A is correct

I: Only Statement B is correct

S: Both statements are correct

E: neither statement is correct

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: Convergence is an ICT development characterized by accomplishing similar goals or tasks across various devices.

B: Assistive technologies are designed to make ICT inclusive

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is incorrect

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A network refers to a collection of computers, internet devices, and communication media that carry data from one device to another.

B: A server is a computer program that is mainly used to harm devices, access confidential information, or just plainly annoying

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: Phishing is an internet behavior characterized by sending indiscriminately large numbers of emails/chat messages to several (or single) recipient/s.

B: Malware is short for malicious software, and encompasses a wide range of online threats designed to harm devices, networks, and users, and often for the benefit of cybercriminals.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A Trojan is a type of malware that is discreetly designed to surreptitiously record a user's keystrokes without their knowledge or consent.

B: Keyloggers is a type of malware that cannot self-replicate but can redirect internet traffic, monitor a user's activity, and set-up backdoor access points to the system, making the device or network vulnerable to other online attacks.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A bot is a software application that performs automated tasks on command. While there are legitimate uses of them, they can also be used for malicious purposes.

B: The single purpose of spyware is to erase user data and ensure that it cannot be recovered.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A rootkit is similar to a type of spyware where a user's activity. It erodes the user's privacy by creating a profile of the user and target advertisements.

B: A file-less malware is a stealthy program that embeds in the computer's core and facilitates unauthorized access, enabling cybercriminals to take control of the compromised system.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?