Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Professional Development

16 Qs

quiz-placeholder

Similar activities

Volume 2

Volume 2

Professional Development

17 Qs

Fun with ML

Fun with ML

10th Grade - Professional Development

20 Qs

SQL Programming Revision

SQL Programming Revision

Professional Development

20 Qs

Technology Morning Tea Quiz

Technology Morning Tea Quiz

KG - Professional Development

11 Qs

TCH_Induction

TCH_Induction

Professional Development

12 Qs

HISTORY COMPUTER 02

HISTORY COMPUTER 02

Professional Development

12 Qs

GIT

GIT

Professional Development

15 Qs

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Meg Perron

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cyber attacks are classified by ______ and __________.

method

target

money

vector

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common methods for attackers to exploit an organization for financial gain.

Ransomware

DoS and DDoS

Unauthorized access

Cryptojacking

Extortion

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

vCISOs are most likely to face attackers motivated by what? (especially in small to mid-sized organizations)

Politics

Activism

Industrial espionage

Money

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT one of the components of the CPU?

Advanced Resource Monitor (ARM)

Arithmetic Logic Unit (ALU)

Memory

Control Unit

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a type of malware that denies legitimate users access to their system and/or data and requires a payment (to the attacker) to regain access.

Virus

Ransomeware

Trojan

Worm

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is cryptojacking used for?

Elevate privilege

Steal encryption keys

Hijack an active network session

Mine bitcoin

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a common input device?

Keybaord

Microphone

Display

Mouse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?