ICT 9/2

ICT 9/2

9th Grade

5 Qs

quiz-placeholder

Similar activities

Quiz Perangkat Keras Komputer

Quiz Perangkat Keras Komputer

7th Grade - University

10 Qs

Latihan Soal Informatika : Berpikir Komputasional - 2

Latihan Soal Informatika : Berpikir Komputasional - 2

7th Grade - University

10 Qs

UHB Informatika Kelas IX

UHB Informatika Kelas IX

9th Grade

10 Qs

quis hardware

quis hardware

7th Grade - University

10 Qs

REVIEW TIME

REVIEW TIME

9th Grade - University

10 Qs

Dampak Sosial Teknologi

Dampak Sosial Teknologi

9th Grade

10 Qs

Materi Berpikir Komputasional

Materi Berpikir Komputasional

9th Grade - University

10 Qs

Quiz Gerbang Logika HOTS

Quiz Gerbang Logika HOTS

9th Grade

10 Qs

ICT 9/2

ICT 9/2

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Medium

Created by

John Ganzon

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

the primary protocol used to send data between a web browser and a website

Uniform Resource Locator

HyperText Transfer Protocol Secure

Internet Service Protocol

HyperText Markup Language

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A document written in hypertext (also known as HTML) that you can see online, using a web browser

web page

cookies

cache

spam

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Small text files that websites save to a user's device. They contain information such as user preferences, login details, and other data.

web page

cookies

cache

spam

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems

malware

phishing

cyber threat

data intrusion

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

technique for attempting to acquire sensitive data,

such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person

malware

phishing

cyber threat

data intrusion