computer security and privacy

computer security and privacy

9th Grade

26 Qs

quiz-placeholder

Similar activities

Jude software Exam

Jude software Exam

2nd Grade - University

25 Qs

Microsoft 98-365 Server Admin Part 2

Microsoft 98-365 Server Admin Part 2

KG - Professional Development

22 Qs

Y9 Autumn Assessment

Y9 Autumn Assessment

9th Grade

25 Qs

Crash Course Computer Science

Crash Course Computer Science

7th - 9th Grade

26 Qs

Feb. Assessment Revision

Feb. Assessment Revision

9th - 11th Grade

26 Qs

Computer Systems and Computer Ethics

Computer Systems and Computer Ethics

8th - 12th Grade

25 Qs

Be Internet Awesome Part 1

Be Internet Awesome Part 1

6th - 12th Grade

21 Qs

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

23 Qs

computer security and privacy

computer security and privacy

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Casondra Simons

Used 280+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it.

active content

cache memory

cookie

spam

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act or instance of making a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup.

cache memory

backup

copyright

encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet.

backup

firewall

cache memory

encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission

encryption

copyright

computer privacy

hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users.

cache memory

active content

firewall

cookie

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law.

copyright

encryption

computer privacy

decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of reconverting the encrypted data into a readable and usable form.

copyright

firewall

decryption

computer security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?