ICT revision source

ICT revision source

7th - 8th Grade

7 Qs

quiz-placeholder

Similar activities

Chapter 1 - OS & GUI Roles and Functions

Chapter 1 - OS & GUI Roles and Functions

8th Grade

10 Qs

h,e,Good technique

h,e,Good technique

6th - 7th Grade

10 Qs

Componentes perifericos del ordenador

Componentes perifericos del ordenador

7th Grade

10 Qs

Redes de Computadores e Telecomunicações aula 2

Redes de Computadores e Telecomunicações aula 2

1st Grade - University

10 Qs

Recruitment

Recruitment

7th Grade

11 Qs

Microbit Features Activity

Microbit Features Activity

6th - 8th Grade

9 Qs

Unit #6 | Worksheet Quiz

Unit #6 | Worksheet Quiz

7th Grade

10 Qs

Robotica 2018

Robotica 2018

5th - 9th Grade

11 Qs

ICT revision source

ICT revision source

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Rafaella Gabriel

Used 3+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a black hat hacker

A person with a black hat

Ties the components together

Skilled hackers who work for criminal organisations through the dark web

Algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a white hat hacker?

Work for a business and attempt to hack into their own system to try make it secure.

DDoS

Hackers flood the server with internet traffic

A white hat for a hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a grey hat hacker?

A hacker that is "good"

Look for vulnerabilities in a system without permission but they don't damage or steal any files.

A grey hat for a grey hacker

Someone who helps you to not get hacked

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS stand for?

Donut Dips on Stand

Dangerous Damage of Security

Dark Drive of Secret

Distributed Denial of Service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is DDoS?

Hackers flood a server with internet traffic to stop a person accessing online traffic.

Denial of dangerous services on your network

star network topology

Algorithm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When was the Computer Misuse Act made?

1990

algorithm

1999

1989

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first Computer Misuse Act?

Unauthorised access to computer material

Unauthorised request from the bank

Deleting data without permission

LAN