Evolution of Home Computing: From PCs to Security Threats

Interactive Video
•
Architecture, Information Technology (IT), Business
•
KG - University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What has become as common in homes as a fridge or a phone?
Microwave
Washing Machine
Computer
Television
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which company is known for providing the operating system for over 90% of the world's personal computers?
IBM
Microsoft
Apple
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the first product to carry the Windows name?
Windows Vista
Windows 95
Windows 1.0
MS-DOS
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which company is known for its innovative aesthetic design and has a strong appeal among young users?
Sony
Apple
Samsung
Dell
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used for electronic junk mail delivered to your e-mail inbox?
Trojan
Malware
Spam
Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method used by hackers to access your home's wireless network?
Backdoor Trojan
Guessing passwords
Using a VPN
Phishing emails
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is essential to protect your computer from outside influence?
Antivirus software and firewalls
Regular updates
Strong passwords
Cloud storage
Similar Resources on Wayground
2 questions
Web Hacker's Toolbox - Tools Used by Successful Hackers - Bypassing Web Application Firewalls Overview

Interactive video
•
University
2 questions
Evolution of Home Computing: From PCs to Security Threats

Interactive video
•
KG - University
6 questions
Info Security Europe: Cybersecurity for Business Systems and Domestic Users

Interactive video
•
KG - University
6 questions
Practical Cyber Hacking Skills for Beginners - Section Preview-5

Interactive video
•
University
2 questions
Firewalls and Security Appliances

Interactive video
•
University
6 questions
Describe the different types of malware that could affect a computer system or network : Understand the types of malware

Interactive video
•
University
2 questions
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with S

Interactive video
•
University
2 questions
Cutting Through The Hype

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Architecture
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade