Q2 E-Tech Newton (WISE Test)

Q2 E-Tech Newton (WISE Test)

12th Grade

8 Qs

quiz-placeholder

Similar activities

FILE HANDLING IN PYTHON

FILE HANDLING IN PYTHON

12th Grade

10 Qs

SQL

SQL

10th - 12th Grade

11 Qs

U1L1 Alonzo wants you to know...

U1L1 Alonzo wants you to know...

7th Grade - University

12 Qs

AP Computer Science Principles - Unit 4: Variables, Conditionals

AP Computer Science Principles - Unit 4: Variables, Conditionals

9th - 12th Grade

10 Qs

Java Loops

Java Loops

9th - 12th Grade

12 Qs

Python Boolean

Python Boolean

11th - 12th Grade

11 Qs

Python Boolean and If

Python Boolean and If

9th - 12th Grade

10 Qs

ICT QUIZ

ICT QUIZ

9th - 12th Grade

10 Qs

Q2 E-Tech Newton (WISE Test)

Q2 E-Tech Newton (WISE Test)

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Earl Ortiz

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A Virus is a self-replicating code that infects applications and can cause data theft, DDoS or ransomware attacks

B: A worm is a standalone program that spread rapidly and can execute damage to systems by deleting files, creating botnets, or consuming bandwidth.

W: Only statement A is correct

I: Only Statement B is correct

S: Both statements are correct

E: neither statement is correct

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: Convergence is an ICT development characterized by accomplishing similar goals or tasks across various devices.

B: Assistive technologies are designed to make ICT inclusive

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is incorrect

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A network refers to a collection of computers, internet devices, and communication media that carry data from one device to another.

B: A server is a computer program that is mainly used to harm devices, access confidential information, or just plainly annoying

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: Phishing is an internet behavior characterized by sending indiscriminately large numbers of emails/chat messages to several (or single) recipient/s.

B: Malware is short for malicious software, and encompasses a wide range of online threats designed to harm devices, networks, and users, and often for the benefit of cybercriminals.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A Trojan is a type of malware that is discreetly designed to surreptitiously record a user's keystrokes without their knowledge or consent.

B: Keyloggers is a type of malware that cannot self-replicate but can redirect internet traffic, monitor a user's activity, and set-up backdoor access points to the system, making the device or network vulnerable to other online attacks.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A bot is a software application that performs automated tasks on command. While there are legitimate uses of them, they can also be used for malicious purposes.

B: The single purpose of spyware is to erase user data and ensure that it cannot be recovered.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A: A rootkit is similar to a type of spyware where a user's activity. It erodes the user's privacy by creating a profile of the user and target advertisements.

B: A file-less malware is a stealthy program that embeds in the computer's core and facilitates unauthorized access, enabling cybercriminals to take control of the compromised system.

W: Only statement A is correct

I: Only statement B is correct

S: Both statements are correct

E: Neither statement is correct

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following describes the rules of conduct for respectful and appropriate communication using the internet?

Etiquette

Ethics

Netiquette

Proper Communication