IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN

TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN

11th Grade

10 Qs

hardware and software(g3)

hardware and software(g3)

2nd - 10th Grade

10 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

MODULE 9 PRE-TEST

MODULE 9 PRE-TEST

10th Grade

10 Qs

9G4 CS Python Programming Sequence and Vocabs

9G4 CS Python Programming Sequence and Vocabs

9th Grade

13 Qs

Kuis PPJ - Materi VLSM

Kuis PPJ - Materi VLSM

11th Grade

15 Qs

Robotica 2018

Robotica 2018

5th - 9th Grade

11 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Mykhailo Shapkin

Used 29+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Malicious code installed to redirect users to a fake website

A way of gaining illegal access to a computer system

Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor

Malicious code installed to redirect users to a fake website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus in comp sci context is

A form of encryption requiring both a public and a private key

A thing that makes your computer cough

Program code that can replicate/copy itself with the intention of

deleting/corrupting data/files or causing the computer to malfunction

Malicious code installed to redirect users to a fake website

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

Sending legitimate-looking emails to encourage users to give out personal data

The editing of program source code so that it can be exploited or changed for a specific purpose

Playing fishing games on a PC professionally

Used to verify that data comes from a trusted source

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming is

Pieces of data which allow detection of web pages viewed by a user and store their preferences

A way of gaining illegal access to a computer system

Playing farming games on a PC semi-professionally

Malicious code installed to redirect users to a fake website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shareware is

Software that a user can download free of charge and use for free forever, no caveats

Software that user can try out for free for a trial period

Used to verify that data comes from a trusted source

Part of Ukrainian national dress (for real though, sounds very similar)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is

A form of encryption requiring both a public and a private key

A set of principles set out to regulate use of computers

A way of gaining illegal access to a computer system

A form of encryption using one private key for both sender and recipient

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware / key-logging software is

Software that gathers data by monitoring key presses on user's keyboards

A form of encryption requiring both a public and a private key

Malicious code installed to redirect users to a fake website

Secret type of software that only spies can use

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?