Search Header Logo

COMPUTER SECURITY (Images: Flirck)

Authored by Susana Díaz

Computers

8th Grade - University

Used 18+ times

COMPUTER SECURITY (Images: Flirck)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Giving objects interactivity is known as ...

Big data

Digital security

internet of things

None is correct

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Managing and analyzing huge volumes of data is called ...

Interent of things

Big data

Pasive security

Active security

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Computer security is a set of measures aimed at protecting

hardware.

hardware and software.

the information and people.

hardware, software, information and people.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

The set of actions aimed at protecting the computer and its content (information) is called ...

Active security

Passive security

People security

All responses are correct

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Programs that hijack other programs to use their rights or to modify their behavior...

Hijacker

Virus

Trojan

Warm

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Malicious Software...

Virus

Trojan

All are correct

Warm

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Malicious program that pretends to overflow the system memory by reproducing itself is called ...

Virus

Worm.

Trojan

All are correct

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?