Computer Threats

Computer Threats

9th - 12th Grade

27 Qs

quiz-placeholder

Similar activities

Applied Economics Revisit

Applied Economics Revisit

12th Grade

25 Qs

Ratio Analysis

Ratio Analysis

12th Grade - University

25 Qs

Professional Communication Pre-Assessment

Professional Communication Pre-Assessment

9th - 12th Grade

29 Qs

ABM 1 SA #1 Reviewer

ABM 1 SA #1 Reviewer

11th Grade

26 Qs

Tecnology FCCLA

Tecnology FCCLA

9th Grade

27 Qs

Exploring Careers: A Quiz for Grade 7 Students

Exploring Careers: A Quiz for Grade 7 Students

7th Grade - University

28 Qs

Teknologi Ritel Quiz

Teknologi Ritel Quiz

12th Grade

25 Qs

Computer Threats

Computer Threats

Assessment

Quiz

Business

9th - 12th Grade

Medium

Created by

Marcia Bernas

Used 49+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a person who illegally exploits computer harware or software

host

hacker

computer resident

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a program file that installs itself without permission

virus

antivirus

overwriting virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

to contaminate a computer with a virus

install

infect

imbed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any program that is designed to enter a computer without notice and disrupt its normal operations

Malware
Computer virus
Computer worm
Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files on the same computer

Malware
Computer virus
Computer worm
Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer program that seems to perform one function while actually doing something else

Malware
Computer virus
Computer worm
Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A self-copying program designed to carry out some unauthorized activity on a victim's computer

Malware
Computer virus
Computer worm
Trojan Horse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?