Search Header Logo

Unit #10 | Worksheet #2

Authored by Saba T.

Computers

8th Grade

Used 34+ times

Unit #10 | Worksheet #2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: People who create malware don't do it for monetary gain.

Media Image
Media Image

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Comwar, Cabir, and Skulls are examples of ... ?

Computer Virus

Mobile Virus

Worms

Rootkits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Email attachments from trusted friends is never a threat.

Media Image
Media Image

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Virus attaches itself to a program which is called a ... ?

base program

host program

main program

BIOS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: All malware needs a host program file.

Media Image
Media Image

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

When did the Melissa computer virus first appear?

January 2004

April 2000

March 1999

August 1995

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: A sign of virus infection is unrecognized file extensions.

Media Image
Media Image

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?