Search Header Logo
Test2

Test2

Assessment

Presentation

Computers

University

Medium

Created by

Hemali Makhija

Used 12+ times

FREE Resource

21 Slides • 28 Questions

1

Test2

Review

Slide image

2

Slide image

3

Slide image

4

Multiple Choice

The ability to control what information you reveal about yourself over the Internet and who can access that information.

1

Citation

2

Email

3

Privacy

4

Password

5

Slide image

6

Multiple Select

Which of the following describe 'Social engineering'?

1

Insulting people so they give-up information

2

Manipulating people to give-up information

3

Assaulting people so they give up information

4

Paying people so they give-up goods and services

7

Multiple Choice

When thieves go searching through dumpsters, trash cans, recycling bins, and even trash heaps at the landfill to find personal information.
1
Pharming
2
Credit Card Fraud
3
Dumpster Diving
4
Phishing

8

Multiple Choice

What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."

1

Phishing

2

Pharming

3

Doxxing

4

Smishing

9

Multiple Choice

How are people targeted through Phishing?

1

Through Emails

2

on Websites

3

Using phone calls

4

Sending messages

10

Slide image

11

Multiple Choice

A White Hat Hacker :

1

Tests Security Systems (On Computers)

2

Hackers Don't Wear Hats (Because They Sit Inside All Day Making Malware)

3

Burns Computers

4

Hackers Don't Wear Hats (Because They Sit Inside All Day Making Malware)

12

Multiple Choice

A Black Hat Hacker:

1

Make Computer Systems

2

Commit Cyber-crimes

3

Wear black clothes when hacking

4

Don't Exist

13

Multiple Choice

What is true about "Anonymous"?

1

Hacktivist

2

creates malware

3

check the computer programs of government

4

tries to influence politics through hacking

14

Slide image

15

Multiple Choice

What is ransomware?

1

It locks your files and you receive a message asking for payment to release them.

2

It tells the user their computer is infected with a virus to scare them into downloading malware.

3

It changes permissions on the computer giving hackers administration rights.

16

Multiple Choice

What is spyware?

1

A program that replicates itself and spreads to other computers via attachments.

2

Hardware that controls a computer without the user's knowledge.

3

A program that monitors computer activity in an attempt to steal sensitive information.

17

Multiple Choice

A _________ is a network of computers on which software has been installed to control them without their user’s knowledge.

1

botnet

2

virus

3

firewall

4

ransomware

18

Multiple Choice

Which of the following is true about cyberwar?

1

Stuxnet virus nearly started a cyber war

2

Hackers fight each other

3

No such thing exists

19

Slide image

20

Multiple Choice

Why do you need to update your anti-virus software?

1

To counter the new viruses

2

The updates are malware

3

To delete malware

4

It's a scam

21

Multiple Choice

To give two different forms of identification

1

Authentication

2

Two-factor authentication

3

Firewalls

4

Anti malware software

22

Multiple Choice

What does a FIREWALL do?

1

Protects against hackers.

2

Protects against computer viruses

3

Protects against threats from inside your organisation.

4

None of the above.

23

Slide image

24

Slide image

25

Slide image

26

Multiple Choice

Cara's new phone does not support WhatsApp. She is not happy with her purchase. She is concerned with the ___ of the phone.

1

Network Effect

2

Anti-Network Effect

3

Ecosystem

27

Multiple Choice

All of my friends use WhatsApp. So, to chat with them, I will also download WhatsApp. This is an example of:

1

Hardware

2

Ecosystem

3

Network Effect

4

Anti-Network Effect

28

Slide image

29

Slide image

30

Multiple Choice

For few years, researchers were not able to increase the CPU speed. What was the obstacle?

1

Size of CPU cannot fit in the computer

2

More heat, then bigger fan is needed

3

It is impossible to have larger than 2 GHz speed

4

People don't need faster speed than 2 GHz. Then, it will not be sold.

31

Multiple Choice

CPU achieved a speed of 2GHz, after which it was difficult to increase the speed. How did they solve this issue?

1

Added extra fan to cool the CPU faster

2

Added multi-cores in a single CPU

3

The problem could not be solved

4

They invented better CPU

32

Slide image

33

Multiple Choice

Question image

Which computer has the fastest CPU?

1

Computer X

2

Computer Y

3

Computer Z

34

Slide image

35

Slide image

36

Slide image

37

Slide image

38

Slide image

39

Multiple Choice

My TV has an internal memory of 2 B. How many bits is that?

1

4 bits

2

16 bits

3

64 bits

4

128 bits

40

Multiple Choice

Choose the best option for Short term memory/ primary memory:

1

Temporary/volatile in nature, Requires power/electricity to retain information.Example is RAM

2

Cheaper than other memory. Example is NAND memory

41

Multiple Choice

Long term/Secondary memory

1

Non volatile, save files , slower and cheaper

2

Volatile, open files, faster and expensive

42

Multiple Choice

SSDs are:

A. Faster than RAM

B. more expensive than HDDs

1

Only A is true

2

Only B is true

3

Both A and B are true

43

Multiple Choice

Question image

Which computer has the fastest secondary storage?

1

Computer X

2

Computer Y

3

Computer Z

44

Multiple Select

Question image

Which computer has the smallest storage drive? (multiple answers)

1

Computer X

2

Computer Y

3

Computer Z

45

Slide image

46

Slide image

47

Multiple Choice

Which of the following is not a peripheral?

1

Keyboard

2

Random Access Memory

3

Mouse

4

Microphone

48

Slide image

49

Multiple Choice

The study of people's efficiency in a working environment:

1

Network Effect

2

Ergonomics

3

Ecosystem

Test2

Review

Slide image

Show answer

Auto Play

Slide 1 / 49

SLIDE