Chapter 7

Chapter 7

Professional Development

20 Qs

quiz-placeholder

Similar activities

UML - Orientação a Objetos

UML - Orientação a Objetos

University - Professional Development

18 Qs

Java Fundamentals

Java Fundamentals

Professional Development

20 Qs

SC-900_Módulo 4

SC-900_Módulo 4

Professional Development

19 Qs

E-Commerce

E-Commerce

University - Professional Development

16 Qs

Scratch E

Scratch E

1st Grade - Professional Development

16 Qs

Normas de cableado estructurado

Normas de cableado estructurado

Professional Development

20 Qs

Git-it?

Git-it?

Professional Development

18 Qs

AMD Y INTEL

AMD Y INTEL

University - Professional Development

20 Qs

Chapter 7

Chapter 7

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Peter McDaid

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Gaining unauthorized access to a computer with the intention of corrupting or stealing data is called?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending 'junk' emails, e.g. adverts for products; as a result, the inbox becomes overloaded and time is wasted opening and reading such emails. This is called?

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Sending emails that appear to be from a reliable source; these emails often ask the recipient to update their personal information by clicking a hyperlink that opens a web page - this information is then used by hackers for the purpose of identity theft. What is this called?

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is unintentionally downloaded onto a computer by a user is called?

Hacking

Spyware

Malware

Phishing

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Using a computer to intentionally commit a crime, e.g. stealing data or money is called __________ crime?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware can enter the network through browsing the internet, opening email attachment, via a USB storage device, etc

Key Logger

Trojan Horse

Work

Virus

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

This malware spreads around a computer system by replicating itself.

Trojan Horse

Worm

Spyware

Key Logger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?