Search Header Logo

IGCSE Comp Sci - Security revision

Authored by Mykhailo Shapkin

Computers

9th - 11th Grade

Used 29+ times

IGCSE Comp Sci -  Security revision
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Malicious code installed to redirect users to a fake website

A way of gaining illegal access to a computer system

Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor

Malicious code installed to redirect users to a fake website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus in comp sci context is

A form of encryption requiring both a public and a private key

A thing that makes your computer cough

Program code that can replicate/copy itself with the intention of

deleting/corrupting data/files or causing the computer to malfunction

Malicious code installed to redirect users to a fake website

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

Sending legitimate-looking emails to encourage users to give out personal data

The editing of program source code so that it can be exploited or changed for a specific purpose

Playing fishing games on a PC professionally

Used to verify that data comes from a trusted source

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming is

Pieces of data which allow detection of web pages viewed by a user and store their preferences

A way of gaining illegal access to a computer system

Playing farming games on a PC semi-professionally

Malicious code installed to redirect users to a fake website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shareware is

Software that a user can download free of charge and use for free forever, no caveats

Software that user can try out for free for a trial period

Used to verify that data comes from a trusted source

Part of Ukrainian national dress (for real though, sounds very similar)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is

A form of encryption requiring both a public and a private key

A set of principles set out to regulate use of computers

A way of gaining illegal access to a computer system

A form of encryption using one private key for both sender and recipient

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware / key-logging software is

Software that gathers data by monitoring key presses on user's keyboards

A form of encryption requiring both a public and a private key

Malicious code installed to redirect users to a fake website

Secret type of software that only spies can use

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?