Search Header Logo

ICT Quiz 3 Sec 2

Authored by Low Teacher

Computers

KG - 12th Grade

Used 8+ times

ICT Quiz 3 Sec 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following 3 steps protect you from online security hazards?

Install a firewall

Increase your cloud storage quota

Install anti virus/ anti malware

Update operating system security patches to the latest version

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____ establishes a barrier between your internal network and incoming traffic from the internet in order to block malicious traffic like viruses and hackers (8 letter word no spacing)

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system is known as _____. These include viruses, worms, spyware, ransomware, etc. (7 letter word, no spacing)

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ransomware that crippled many computer systems worldwide in 2017 is known as _____ (8 letter word, no spacing)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pocket, Diigo, Evernote are examples of online _____ tools

client

server

diagnostic

bookmarking

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Social media has _____ settings that limit who can access your profile and what information visitors can see (7 letter word, no spacing)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A blog is a short form for ____

blog builder

bookmarked logs

web log

basic logs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?