TLE ICT

TLE ICT

10th Grade

5 Qs

quiz-placeholder

Similar activities

Pretest

Pretest

10th Grade

10 Qs

Informatika_Sistem Komputer

Informatika_Sistem Komputer

10th Grade

10 Qs

TIK (canva)

TIK (canva)

10th Grade

10 Qs

POST TEST HARDWARE

POST TEST HARDWARE

10th Grade

10 Qs

Soal Koding dan Kecerdasan Buatan untuk SMA/SMK

Soal Koding dan Kecerdasan Buatan untuk SMA/SMK

10th Grade

10 Qs

DESIMINASI KONTEN DIGITAL

DESIMINASI KONTEN DIGITAL

10th Grade

10 Qs

Peran informatika untuk masa depan

Peran informatika untuk masa depan

10th Grade

10 Qs

QUIZ Literasi Informasi dan Membaca Lateral

QUIZ Literasi Informasi dan Membaca Lateral

10th Grade

10 Qs

TLE ICT

TLE ICT

Assessment

Quiz

Information Technology (IT)

10th Grade

Practice Problem

Hard

Created by

John Ganzon

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the primary protocol used to send data between a web browser and a website

Uniform Resource Locator

HyperText Transfer Protocol Secure

Internet Service Protocol

HyperText Markup Language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A document written in hypertext (also known as HTML) that you can see online, using a web browser

web page

cookies

cache

spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Small text files that websites save to a user's device. They contain information such as user preferences, login details, and other data.

web page

cookies

cache

spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems

malware

phishing

cyber threat

data intrusion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

technique for attempting to acquire sensitive data,

such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person

malware

phishing

cyber threat

data intrusion

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?