Search Header Logo

emtech

Authored by Hanna Juezan

Computers

12th Grade

Used 75+ times

emtech
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what do you call a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information?

Trojan

Worm

Malware

Virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.

Malware

Virus

Trojan

Worm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a malicious program that transfers from one computer to another by any type of means.

Trojan

Worm

Virus

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a program designed to send you advertisements, mostly as pop-ups.

spyware

trojan

adware

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Its goal is to acquire sensitive personal information like passwords and credit card details.

Phising

spam

hacking

scam

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which social media platforms would help you store and access your data and programs over the Internet anywhere you are?

slideshare

facebook

file manager

cloud computing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does google map use in order to detect location and use for navigation?

Internet connection

GPS

google map satellite

Map locator

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?