Search Header Logo

Introduction to Information and Communications Technology 2

Authored by Charles Roxas

Computers, Education

11th Grade

Used 27+ times

Introduction to Information and Communications Technology 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

_____ set of rules that determines how to properly communicate and browse the web.

2.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Malicious code is also known as a ___________.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It must be installed by users or intruders before it can affect the system’s assets.

TROJAN HORSE

VIRUS

LOGIC BOMB

WORM

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It goes off and causes threats at a specified time or date.

TROJAN HORSE

VIRUS

LOGIC BOMB

WORM

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copywriting is a legal device that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work

TRUE

FALSE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a program that copies and spreads itself through a network.

TROJAN HORSE

VIRUS

LOGIC BOMB

WORM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Syntax allows a user to look for combinations of terms, exclude other terms, look for various forms of a word, include synonyms, search for phrases rather than single words

TRUE

FALSE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers