
COMPUTER SECURITY (Images: Flirck)
Authored by Susana Díaz
Computers
8th Grade - University
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Giving objects interactivity is known as ...
Big data
Digital security
internet of things
None is correct
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Managing and analyzing huge volumes of data is called ...
Interent of things
Big data
Pasive security
Active security
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Computer security is a set of measures aimed at protecting
hardware.
hardware and software.
the information and people.
hardware, software, information and people.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The set of actions aimed at protecting the computer and its content (information) is called ...
Active security
Passive security
People security
All responses are correct
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Programs that hijack other programs to use their rights or to modify their behavior...
Hijacker
Virus
Trojan
Warm
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Malicious Software...
Virus
Trojan
All are correct
Warm
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Malicious program that pretends to overflow the system memory by reproducing itself is called ...
Virus
Worm.
Trojan
All are correct
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?