
G10 IGCSE ICT Security of Data
Authored by Fritz Bansag
Computers
9th - 10th Grade
Used 244+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is the unauthorised access to a computer system.
Hacking
Cracking
Firewall
Keylogger
Spam
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Editing a program to remove copy protection or add malware
Hacking
Cracking
Firewall
Keylogger
Spam
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that records every character typed and sends it to a criminal
Hacking
Cracking
Firewall
Keylogger
Spam
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software or hardware to control traffic in and out of a network
Hacking
Cracking
Firewall
Keylogger
Spam
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unwanted email sent to a huge number of recipients
Hacking
Cracking
Firewall
Keylogger
Spam
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A word meaning “a system of rules or official procedure”
Protocol
Security
Firewall
Biometrics
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A word meaning “procedures to ensure safety”
Protocol
Security
Firewall
Biometrics
Encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?