
Introduction to Information and Communications Technology 2
Authored by Charles Roxas
Computers, Education
11th Grade
Used 27+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
_____ set of rules that determines how to properly communicate and browse the web.
2.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
Malicious code is also known as a ___________.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It must be installed by users or intruders before it can affect the system’s assets.
TROJAN HORSE
VIRUS
LOGIC BOMB
WORM
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It goes off and causes threats at a specified time or date.
TROJAN HORSE
VIRUS
LOGIC BOMB
WORM
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Copywriting is a legal device that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work
TRUE
FALSE
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a program that copies and spreads itself through a network.
TROJAN HORSE
VIRUS
LOGIC BOMB
WORM
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Syntax allows a user to look for combinations of terms, exclude other terms, look for various forms of a word, include synonyms, search for phrases rather than single words
TRUE
FALSE
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?