Search Header Logo

review checkpoint 1 10 general

Authored by sajedah al-hilo

Computers

1st - 4th Grade

Used 6+ times

review checkpoint 1 10 general
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cyberattack that tries to guess the password by trying different _____________________ is known as a brute force attack.

character combinations

IP addresses

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(/An) ___________ is an exchange where one gives up one thing in order to get something else that one also wants.

virus

trade-off

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(/An) ____________ malware aims to encrypt computer files and ask for money from the owner to recover the data.

ransomware

trojan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A (/An) ______________cyberattack tries to send huge amount of network traffic to the host until it stops working.

denial of service

dot on supply

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware that delivers advertisements to a user on a web browser automatically is called adware.

true

falsa

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worm malware replicates itself and spreads from one computer to another through the network.

true

false

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The degree to which something is fit to be used is known as usability.

true

false

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?