ICT 9/2

ICT 9/2

9th Grade

5 Qs

quiz-placeholder

Similar activities

Materi PPLG Bab ! dan 2

Materi PPLG Bab ! dan 2

4th Grade - University

10 Qs

Pre-Test on Artificial Intelligence

Pre-Test on Artificial Intelligence

9th - 12th Grade

10 Qs

Câu hỏi bài 2 Tìm kiếm thông tin trên web

Câu hỏi bài 2 Tìm kiếm thông tin trên web

5th Grade - University

10 Qs

DT3 Mesuring and Storing Data

DT3 Mesuring and Storing Data

9th - 10th Grade

9 Qs

Computer Hardware Components and Functions

Computer Hardware Components and Functions

9th - 12th Grade

10 Qs

KUIS BAB 3

KUIS BAB 3

7th Grade - University

10 Qs

Kuis - Refleksi Materi Microsoft Excel

Kuis - Refleksi Materi Microsoft Excel

9th Grade - University

10 Qs

Soal penilaian Informatika 1

Soal penilaian Informatika 1

9th Grade

10 Qs

ICT 9/2

ICT 9/2

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Medium

Created by

John Ganzon

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

the primary protocol used to send data between a web browser and a website

Uniform Resource Locator

HyperText Transfer Protocol Secure

Internet Service Protocol

HyperText Markup Language

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A document written in hypertext (also known as HTML) that you can see online, using a web browser

web page

cookies

cache

spam

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Small text files that websites save to a user's device. They contain information such as user preferences, login details, and other data.

web page

cookies

cache

spam

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems

malware

phishing

cyber threat

data intrusion

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

technique for attempting to acquire sensitive data,

such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person

malware

phishing

cyber threat

data intrusion

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?