Revision 3s

Revision 3s

15 Qs

quiz-placeholder

Similar activities

Firewalls and encryption

Firewalls and encryption

KG - University

17 Qs

Protecting Computers from Malware Quiz

Protecting Computers from Malware Quiz

KG - University

10 Qs

Kelas 7 smt 1 Penilaian Bab 2.pdf

Kelas 7 smt 1 Penilaian Bab 2.pdf

KG - University

15 Qs

(ML) Test Review Chap 4-6

(ML) Test Review Chap 4-6

9th - 12th Grade

20 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

KG - University

15 Qs

Security Fundamentals Chap 1

Security Fundamentals Chap 1

9th - 12th Grade

20 Qs

Internet Basics Unit Quiz Review

Internet Basics Unit Quiz Review

6th Grade

10 Qs

Revision 3s

Revision 3s

Assessment

Quiz

others

Medium

Created by

Nicole Gray

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What is computer security?
a) Protection of physical equipment
b) Safeguarding digital data
c) Installing computer updates
d) Organizing files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What is the purpose of a firewall in computer security?
a) Block unauthorized access
b) Monitor internet speed
c) Organize files
d) Store backups

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. Which of the following is NOT an input device?
Media Image
Media Image
Media Image
Media Image

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. A computer virus is:
a) A type of malware
b) A storage device
c) A computer system
d) A data recovery tool

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which of these devices is used to prevent unauthorized access to a network?
a) Monitor
b) Firewall
c) Printer
d) Scanner

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. A trademark is typically associated with:
a) Software programs
b) Unique brand identity
c) Data security
d) Network protocols

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which of the following best describes "phishing"?
a) Physical theft of a compute
b) Blocking access to unauthorized users
c) Fixing computer malfunctions
d) Sending fake emails to obtain sensitive information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?