Mock Exam Prep

Mock Exam Prep

12th Grade

10 Qs

quiz-placeholder

Similar activities

PKKWU KUIS 1

PKKWU KUIS 1

12th Grade

10 Qs

Examen Sumativo - Paquete Contable y Tributario - 3P 1Q

Examen Sumativo - Paquete Contable y Tributario - 3P 1Q

12th Grade

10 Qs

SINTONIZA LAZOS DE CONTROL

SINTONIZA LAZOS DE CONTROL

12th Grade

10 Qs

Aprendizaje Cooperativo 1

Aprendizaje Cooperativo 1

1st - 12th Grade

10 Qs

Netiquettes

Netiquettes

12th Grade

10 Qs

Sistemas operativos Formateo y Drivers

Sistemas operativos Formateo y Drivers

1st - 12th Grade

14 Qs

Cultura Digital 1 Semestre

Cultura Digital 1 Semestre

12th Grade

15 Qs

Google Sheets

Google Sheets

12th Grade

13 Qs

Mock Exam Prep

Mock Exam Prep

Assessment

Quiz

Instructional Technology

12th Grade

Practice Problem

Medium

Created by

Louise Davies

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to gather your personal information, usually via email, such as your bank details for fraudulent activity is known as:

Fraud

Malware

Phishing

Shoulder surfing

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the benefits of Cloud Computing to a business with offices all over the world? (give two benefits and say why)

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

From the list below, identify ONE disadvantage of using cloud storage

Allows a user to share files

Workers can use collaboration tools such as shared calendars and online meetings

You would need an internet connection as without it you couldn't access any of your documents

Files can easily be shared with others

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a white hat hacker?

They want to find gaps in online games for personal enjoyment

They are vengeful and aggressive

The kind you hear about on the news, after financial gain

A legal hacker employed by businesses to identify weaknesses in security systems

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____________is a way to conceal information by altering it so that it appears to be random data. ____________ is essential for security on the Internet.

6.

OPEN ENDED QUESTION

2 mins • 1 pt

List some ways that a business, that holds personal details (for example a doctors surgery) can keep data safe and secure.

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

2 mins • 1 pt

What PHYSICAL methods could a business use to keep data safe and secure?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?