Revision 3s

Revision 3s

15 Qs

quiz-placeholder

Similar activities

English Test - Grade VIII - Simple Present Tense

English Test - Grade VIII - Simple Present Tense

KG - University

20 Qs

(ML) Test Review Chap 4-6

(ML) Test Review Chap 4-6

9th - 12th Grade

20 Qs

Term2 homework Flowchart

Term2 homework Flowchart

KG - University

10 Qs

Assessment on Computer Hardware and Software

Assessment on Computer Hardware and Software

KG - University

10 Qs

2AL test- UNIT 5 -  Vocabulary review: crimes and criminals

2AL test- UNIT 5 - Vocabulary review: crimes and criminals

KG - University

11 Qs

b5 1-4 Flowcharts - GCSE Quiz

b5 1-4 Flowcharts - GCSE Quiz

KG - University

12 Qs

Virus Scanning and Security Measures

Virus Scanning and Security Measures

KG - University

15 Qs

Revision 3s

Revision 3s

Assessment

Quiz

others

Medium

Created by

Nicole Gray

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What is computer security?
a) Protection of physical equipment
b) Safeguarding digital data
c) Installing computer updates
d) Organizing files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What is the purpose of a firewall in computer security?
a) Block unauthorized access
b) Monitor internet speed
c) Organize files
d) Store backups

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which of the following is NOT an input device?
Media Image
Media Image
Media Image
Media Image

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. A computer virus is:
a) A type of malware
b) A storage device
c) A computer system
d) A data recovery tool

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which of these devices is used to prevent unauthorized access to a network?
a) Monitor
b) Firewall
c) Printer
d) Scanner

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. A trademark is typically associated with:
a) Software programs
b) Unique brand identity
c) Data security
d) Network protocols

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which of the following best describes "phishing"?
a) Physical theft of a compute
b) Blocking access to unauthorized users
c) Fixing computer malfunctions
d) Sending fake emails to obtain sensitive information

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?