OCR L3 ICT - U1 Ethical & Operational Issues - Threats

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

10th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Циклы в Паскале

Циклы в Паскале

10th Grade

20 Qs

TO PAS AIJ

TO PAS AIJ

11th Grade

20 Qs

Quize FTP Server

Quize FTP Server

10th - 11th Grade

19 Qs

Pointers

Pointers

12th Grade

20 Qs

Exam Style Questions

Exam Style Questions

10th - 11th Grade

18 Qs

Algorithms

Algorithms

10th - 11th Grade

20 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

Advantages and Disadvantages of Collecting Data

Advantages and Disadvantages of Collecting Data

10th Grade

20 Qs

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Jon Bridgeman

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?
A program written to cause harm to a computer
A hardware fault which causes data to be damaged
A fault with the CPU which means that data is lost or damaged
None of these

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which law makes it illegal to share computer viruses
The Virus Act
The Internet Act
The Computer Misuse Act
The Data Protection Act

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Trojan Horse do?
Makes the computer stop working
Attaches inside of program
Gets full access
Gets full access

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a self-replicating program that uses the network to duplicate its code to the hosts on the network
Virus
Worm
Trojan
Rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Claire, a co-worker, is browsing the internet and wants to know if it's safe to enter her credit card information into a website.what do you tell her to look for?
HTTPS://
HTTP://
SSL://
TLS://

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ray, a co-worker, is concerned that his computer is infected with adware. what symptoms should you tell ray to look for to confirm his suspicions?
Excessive pop-ups.
pizza
search polo
multifactor login redirection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email in your inbox from your friend Sara. The title of the email is "this is so cool!" and inside the email is an attachment with an .exe extension.what should you do?
delete the email
click the attachment
run virus scan,then click the attachment 
call sara to see if she sent you the mail.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers