IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

ARQ, Check Digit and Encryption Reading Quiz

ARQ, Check Digit and Encryption Reading Quiz

9th Grade

10 Qs

Encryption 2

Encryption 2

8th - 10th Grade

10 Qs

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Security Risk

Security Risk

10th Grade

15 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Mykhailo Shapkin

Used 29+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Malicious code installed to redirect users to a fake website

A way of gaining illegal access to a computer system

Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor

Malicious code installed to redirect users to a fake website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus in comp sci context is

A form of encryption requiring both a public and a private key

A thing that makes your computer cough

Program code that can replicate/copy itself with the intention of

deleting/corrupting data/files or causing the computer to malfunction

Malicious code installed to redirect users to a fake website

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

Sending legitimate-looking emails to encourage users to give out personal data

The editing of program source code so that it can be exploited or changed for a specific purpose

Playing fishing games on a PC professionally

Used to verify that data comes from a trusted source

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming is

Pieces of data which allow detection of web pages viewed by a user and store their preferences

A way of gaining illegal access to a computer system

Playing farming games on a PC semi-professionally

Malicious code installed to redirect users to a fake website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shareware is

Software that a user can download free of charge and use for free forever, no caveats

Software that user can try out for free for a trial period

Used to verify that data comes from a trusted source

Part of Ukrainian national dress (for real though, sounds very similar)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is

A form of encryption requiring both a public and a private key

A set of principles set out to regulate use of computers

A way of gaining illegal access to a computer system

A form of encryption using one private key for both sender and recipient

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware / key-logging software is

Software that gathers data by monitoring key presses on user's keyboards

A form of encryption requiring both a public and a private key

Malicious code installed to redirect users to a fake website

Secret type of software that only spies can use

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?