
IGCSE Comp Sci - Security revision
Authored by Mykhailo Shapkin
Computers
9th - 11th Grade
Used 29+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is
Malicious code installed to redirect users to a fake website
A way of gaining illegal access to a computer system
Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor
Malicious code installed to redirect users to a fake website
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus in comp sci context is
A form of encryption requiring both a public and a private key
A thing that makes your computer cough
Program code that can replicate/copy itself with the intention of
deleting/corrupting data/files or causing the computer to malfunction
Malicious code installed to redirect users to a fake website
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is
Sending legitimate-looking emails to encourage users to give out personal data
The editing of program source code so that it can be exploited or changed for a specific purpose
Playing fishing games on a PC professionally
Used to verify that data comes from a trusted source
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pharming is
Pieces of data which allow detection of web pages viewed by a user and store their preferences
A way of gaining illegal access to a computer system
Playing farming games on a PC semi-professionally
Malicious code installed to redirect users to a fake website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shareware is
Software that a user can download free of charge and use for free forever, no caveats
Software that user can try out for free for a trial period
Used to verify that data comes from a trusted source
Part of Ukrainian national dress (for real though, sounds very similar)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Symmetric encryption is
A form of encryption requiring both a public and a private key
A set of principles set out to regulate use of computers
A way of gaining illegal access to a computer system
A form of encryption using one private key for both sender and recipient
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware / key-logging software is
Software that gathers data by monitoring key presses on user's keyboards
A form of encryption requiring both a public and a private key
Malicious code installed to redirect users to a fake website
Secret type of software that only spies can use
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Arduino
Quiz
•
7th - 9th Grade
10 questions
Q1 M 2 - TOPIC 2 / Check your understanding
Quiz
•
10th Grade
11 questions
ICT - Networks and communication
Quiz
•
9th Grade
10 questions
4Q Week3 Review Quiz (Who missed the Quiz ONLY))
Quiz
•
9th Grade
10 questions
Arduino
Quiz
•
7th - 12th Grade
13 questions
Kuis Animasi 3D - 3
Quiz
•
11th Grade
10 questions
Sprawdź się
Quiz
•
4th - 12th Grade
15 questions
Networking Quiz
Quiz
•
8th - 9th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade