Search Header Logo
security

security

Assessment

Presentation

Computers

5th Grade

Practice Problem

Hard

Created by

Ntubuura Stephen

FREE Resource

120 Slides • 28 Questions

1

media

2

media

3

Multiple Choice

Which of the following is NOT mentioned as an emerging issue related to ICT in the background information?

1

Environmental concerns

2

Legal and ethical issues

3

System security

4

Sports and physical fitness

4

Open Ended

Why is it important for students of ICT to learn about system security, ethical issues, and emerging technologies?

5

media

6

media

7

Open Ended

What are some appropriate ways of protecting data in computer systems?

8

media

9

Multiple Choice

Which of the following best describes 'integrity' in the context of data security?

1

Ensuring data is available when needed

2

Preventing unauthorized modification of data

3

Avoiding unauthorized disclosure of data

4

Protecting physical computer equipment

10

media

11

Open Ended

Explain the differences between data security and physical security in the context of computer systems.

12

Multiple Choice

Which of the following is NOT a form of computer security?

1

Data security

2

Physical security

3

Network security

4

Software security

13

media

14

Fill in the Blank

A computer security risk is an action that causes loss of or damage to ___ system.

15

media

16

Multiple Select

Which of the following are considered security threats to computer-based information systems?

1

System failure

2

Information theft

3

Hardware theft

4

Data backup

17

media

18

Open Ended

Explain how organizations can protect themselves against hardware failure and describe the role of disaster recovery plans.

19

Multiple Choice

Which of the following is NOT a cause of computerized information system failure?

1

Hardware failure due to improper use

2

Unstable power supply

3

Software piracy

4

Natural disasters

20

media

21

Fill in the Blank

Hardware theft is the act of stealing computer ___.

22

media

23

Multiple Select

Which of the following are methods to guard against software theft and piracy?

1

Product activation

2

License agreement

3

Data backup

4

Biometric authentication

24

media

25

Multiple Choice

Which of the following is an example of an Internet or network attack?

1

Hardware vandalism

2

Trojan horse

3

Natural disaster

4

Unstable power supply

26

media

27

Open Ended

Discuss the potential consequences of unauthorized access and use in an organization, and suggest measures to prevent it.

28

media

29

media

30

Multiple Choice

Which of the following best describes a computer virus?

1

A program that protects your computer from malware

2

A potentially damaging computer program that infects a computer and spreads to damage files and system software

3

A harmless application that helps organize files

4

A tool used to speed up computer performance

31

media

32

Open Ended

Explain the difference between a worm and a Trojan horse in computer security.

33

media

34

Fill in the Blank

A macro virus is a type of virus that infects ___ in applications such as word processing or spreadsheet programs.

35

media

36

Multiple Select

Which of the following are symptoms that a computer might be infected by a virus?

1

Operating system runs much slower than usual

2

Files become corrupted

3

Existing programs and files disappear

4

All of the above

37

media

38

Open Ended

What is a virus signature and how do antivirus programs use it?

39

media

40

Multiple Choice

What happens if an antivirus program identifies an infected file?

1

It deletes the file immediately

2

It attempts to remove the virus or quarantines the file if it cannot be removed

3

It ignores the file

4

It sends the file to the manufacturer

41

media

42

Multiple Choice

Which of the following is NOT a recommended control measure against computer viruses?

1

Install the latest versions of anti-virus software and keep it updated

2

Always scan removable storage media for viruses before using them

3

Open all email attachments to check for viruses

4

Keep a recovery disk with an uninfected copy of key operating system commands

43

media

44

Open Ended

What are some tips for preventing virus, worm, macro virus, and Trojan horse infections?

45

media

46

Fill in the Blank

Fill in the blank: A networked computer is one which is connected to any other computer for the purpose of exchanging ___, information or resources.

47

Multiple Select

Which of the following are common ways viruses are spread on standalone computers?

1

Through downloading email attachments

2

By using floppy diskettes

3

Playing games on the internet

4

Through opening infected programs or documents on CR/DVD discs

48

media

49

Open Ended

Explain the process by which a virus can spread through email attachments as illustrated in the diagram.

50

media

51

media

52

Multiple Choice

Which of the following best describes a cyberterrorist?

1

Someone who uses email as a vehicle for extortion

2

Someone who uses prewritten hacking programs to break into computers

3

Someone who uses the Internet or network to destroy or damage computers for political reasons

4

Someone who accesses a computer or network illegally to steal information

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

media

77

media

78

media

79

media

80

media

81

media

82

media

83

media

84

media

85

media

86

media

87

media

88

media

89

media

90

media

91

media

92

media

93

media

94

media

95

media

96

media

97

media

98

media

99

media

100

media

101

media

102

media

103

media

104

media

105

media

106

media

107

media

108

media

109

media

110

media

111

media

112

media

113

media

114

media

115

media

116

media

117

media

118

media

119

media

120

media

121

media

122

media

123

media

124

media

125

media

126

media

127

media

128

media

129

media

130

media

131

media

132

media

133

media

134

media

135

media

136

media

137

media

138

media

139

media

140

media

141

media

142

media

143

media

144

media

145

media

146

media

147

Open Ended

Reflecting on today's lesson, how do you think understanding ICT ethical issues and system security can impact your daily use of technology?

148

Multiple Choice

What are some of the key emerging issues in ICT that require extra attention, as discussed in the lesson?

1

Environmental concerns, legal and ethical issues, system security, and users of computer applications

2

Only system security and privacy issues

3

Hardware maintenance and software updates

4

Internet speed and connectivity

media

Show answer

Auto Play

Slide 1 / 148

SLIDE