
emtech
Authored by Hanna Juezan
Computers
12th Grade
Used 75+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what do you call a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information?
Trojan
Worm
Malware
Virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
Malware
Virus
Trojan
Worm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a malicious program that transfers from one computer to another by any type of means.
Trojan
Worm
Virus
spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a program designed to send you advertisements, mostly as pop-ups.
spyware
trojan
adware
worm
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Its goal is to acquire sensitive personal information like passwords and credit card details.
Phising
spam
hacking
scam
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which social media platforms would help you store and access your data and programs over the Internet anywhere you are?
slideshare
file manager
cloud computing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does google map use in order to detect location and use for navigation?
Internet connection
GPS
google map satellite
Map locator
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?