ICT revision source

ICT revision source

7th - 8th Grade

7 Qs

quiz-placeholder

Similar activities

Tecnología, procesos, productos, sistemas, servicios 8º

Tecnología, procesos, productos, sistemas, servicios 8º

8th Grade

11 Qs

Impresa e siti web

Impresa e siti web

8th - 12th Grade

10 Qs

Interstate Competition

Interstate Competition

7th - 10th Grade

11 Qs

Praktik Lintas bidang

Praktik Lintas bidang

7th Grade

10 Qs

Documentos Comerciales

Documentos Comerciales

1st - 12th Grade

10 Qs

SECUNDARIA TICS NOVIEMBRE 21

SECUNDARIA TICS NOVIEMBRE 21

8th Grade

10 Qs

GCW_GestãoWeb

GCW_GestãoWeb

1st - 10th Grade

10 Qs

Repaso Tema 1 Aplicaciones de Ofimática

Repaso Tema 1 Aplicaciones de Ofimática

6th - 8th Grade

10 Qs

ICT revision source

ICT revision source

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Rafaella Gabriel

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a black hat hacker

A person with a black hat

Ties the components together

Skilled hackers who work for criminal organisations through the dark web

Algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a white hat hacker?

Work for a business and attempt to hack into their own system to try make it secure.

DDoS

Hackers flood the server with internet traffic

A white hat for a hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a grey hat hacker?

A hacker that is "good"

Look for vulnerabilities in a system without permission but they don't damage or steal any files.

A grey hat for a grey hacker

Someone who helps you to not get hacked

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS stand for?

Donut Dips on Stand

Dangerous Damage of Security

Dark Drive of Secret

Distributed Denial of Service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is DDoS?

Hackers flood a server with internet traffic to stop a person accessing online traffic.

Denial of dangerous services on your network

star network topology

Algorithm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When was the Computer Misuse Act made?

1990

algorithm

1999

1989

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first Computer Misuse Act?

Unauthorised access to computer material

Unauthorised request from the bank

Deleting data without permission

LAN

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?