
BTEC IT Unit 1 - D1 Threats to data
Authored by Louise Lockwood
Computers
10th - 12th Grade
CCSS covered
Used 189+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Select ALL the malware
Worm
Trojan Horse
WAN
Virus
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Malware is the term used to describe mail that is phishing for personal data.
True
False
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer ****** is one type of malware (malicious software) which is installed without your knowledge, with the purpose of doing harm . A ******** is a program which infects (embeds itself in) other programs or data files. It is easily spread if a user innocently sends an infected file to someone else
Virus
Trojan Horse
WAN
Worm
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
•A ******* is a type of malware
•It is a standalone program that does need to attach itself to an existing program in order to spread
Virus
Trojan Horse
WAN
Worm
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
•may open a “back door” into your computer system through which your personal information can be harvested.
•It can also use your computer power and network bandwidth to send thousands of spam emails to others.
Virus
Trojan Horse
WAN
Worm
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Spyware is software that gathers information about a person or organisation without their knowledge?
True
False
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is NOT illegal
Virus
DDos
Trojan Horse
Adware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?