Unit 2 Learning Aim A Revision quiz

Unit 2 Learning Aim A Revision quiz

11th Grade

53 Qs

quiz-placeholder

Similar activities

Y10. U4. Networks Part 1

Y10. U4. Networks Part 1

9th - 12th Grade

52 Qs

MTA Exam 98-366: Networking Fundamentals

MTA Exam 98-366: Networking Fundamentals

11th Grade

50 Qs

Computer Fundamentals MCQ Quiz by Tr.WLH

Computer Fundamentals MCQ Quiz by Tr.WLH

9th - 12th Grade

50 Qs

AP CSP Quizizz 10-22 - TUESDAY

AP CSP Quizizz 10-22 - TUESDAY

9th - 12th Grade

53 Qs

Comptia CH 6

Comptia CH 6

KG - 12th Grade

58 Qs

ETECH QUIZ NUMBER 4 TOPIC NUMBER 3

ETECH QUIZ NUMBER 4 TOPIC NUMBER 3

11th Grade

48 Qs

CAT - Gr 10 - Hardware & Software

CAT - Gr 10 - Hardware & Software

KG - University

50 Qs

Q3 ICT Periodical Test

Q3 ICT Periodical Test

9th Grade - University

52 Qs

Unit 2 Learning Aim A Revision quiz

Unit 2 Learning Aim A Revision quiz

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Ruth Lock

Used 14+ times

FREE Resource

53 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain one way that the health sector uses technology to care for patients

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

State one type of PoS (Point of Sale) technology

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe one benefit of PoS Technology for Customers

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe two benefits of PoS technology for Sellers

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of these terms means 'using resources to meet current needs without taking away resources for the future?

Sustainability

Carbon Footprint

Greenhouse effect

Renewable Energy

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Malware is a threat to computer security, identify two examples of malware

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

All computer systems are at risk of attacks from unauthorised sources, describe two ways in which a user can use software to protect their system from these types of attacks.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?