Substitute Work 1

Substitute Work 1

6th - 8th Grade

20 Qs

quiz-placeholder

Similar activities

ICT and SST Week Quiz_Grade 6

ICT and SST Week Quiz_Grade 6

6th Grade

20 Qs

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

4th - 8th Grade

16 Qs

History of Computers

History of Computers

6th - 12th Grade

15 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

HTML

HTML

8th - 12th Grade

15 Qs

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

Sistem Komputer dan Analisa Data

Sistem Komputer dan Analisa Data

7th Grade

15 Qs

Substitute Work 1

Substitute Work 1

Assessment

Quiz

Computers

6th - 8th Grade

Easy

Created by

Eric Sharper

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Computer programs designed to gain inappropriate or unauthorized access to computer systems and information.

Malware

Spam

Pop-up

Pretexting

2.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

A small text file that a website sends to a web browser to store on a user's computer.

Cookie

Cache

Bookmark

Encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

A security instrument that controls network communication and user access to computers and networks.

Firewall

Ecommerce

Spyware

Windows Defender

4.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

A system for preventing malicious software and users from accessing an individual computer.

Host-based Firewall

Network Firewall

Public Firewall

Private Firewall

5.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

The process of transforming information into a format that can only be read by authorized entities.

Encryption

Authentication

Social Engineering

Ecommerce

6.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

The process of validating the identity of a computer user.

Authentication

Identification

User Identity

Confirmation

7.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Techniques used by threat agents to obtain personal information that can be used to access secure data and computer assets or to circumvent security policies and procedures.

Social Engineering

Identity Theft

Malicious Attachment

Pharming

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers