Antivirus Software

Lesson 4: Vocabulary (CS)
Quiz
•
Kyle Speed
•
Computers
•
6th Grade
•
334 plays
•
Medium
Student preview

9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Software that protects the computer from any virus-related harm.
A file that is retrieved from the Internet or the process of receiving a file over the Internet.
Any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
An access control technique that helps keep important data safe from hackers by ensuring it can only be accessed with the right credentials.
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Download
URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
A file that is retrieved from the Internet or the process of receiving a file over the Internet.
Any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
An access control technique that helps keep important data safe from hackers by ensuring it can only be accessed with the right credentials.
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Malware
URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
Fake e-mail message appearing to be from a trusted business, social network or other contact.
Any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
An access control technique that helps keep important data safe from hackers by ensuring it can only be accessed with the right credentials.
4.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Password Protection
URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
Fake e-mail message appearing to be from a trusted business, social network or other contact.
Malicious code that secretly watches your computer activity and sends the information over the Internet.
An access control technique that helps keep important data safe from hackers by ensuring it can only be accessed with the right credentials.
5.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Pharming
Programs that look useful, but cause damage to your computer.
URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
Fake e-mail message appearing to be from a trusted business, social network or other contact.
Malicious code that secretly watches your computer activity and sends the information over the Internet.
6.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Phishing
Programs that look useful, but cause damage to your computer.
Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer.
Fake e-mail message appearing to be from a trusted business, social network or other contact.
Malicious code that secretly watches your computer activity and sends the information over the Internet.
7.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Spyware
Programs that look useful, but cause damage to your computer.
Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer.
Software that protects the computer from any virus-related harm.
Malicious code that secretly watches your computer activity and sends the information over the Internet.
8.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Trojan Horse (virus)
Programs that look useful, but cause damage to your computer.
Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer.
Software that protects the computer from any virus-related harm.
A file that is retrieved from the Internet or the process of receiving a file over the Internet.
9.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Virus
A file that is retrieved from the Internet or the process of receiving a file over the Internet.
Any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer.
Software that protects the computer from any virus-related harm.
Similar Resources on Quizizz
10 questions
THREATS IN THE CYBER WORLD
Quiz
•
6th Grade
13 questions
CyberSecurity Lesson 4
Quiz
•
6th - 8th Grade
13 questions
Cybersecurity
Quiz
•
6th - 8th Grade
10 questions
KS3 Computing Quiz 2
Quiz
•
6th - 8th Grade
12 questions
INTERNET SAFETY - MALWARE
Quiz
•
4th - 6th Grade
14 questions
File Extensions
Quiz
•
6th - 8th Grade
12 questions
Grade 6 Computer
Quiz
•
6th Grade
10 questions
Computer keyboard shortcut keys
Quiz
•
5th - 10th Grade
Popular Resources on Quizizz
17 questions
CAASPP Math Practice 3rd
Quiz
•
3rd Grade
20 questions
math review
Quiz
•
4th Grade
21 questions
6th Grade Math CAASPP Practice
Quiz
•
6th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
10 questions
4th Grade Math CAASPP (part 1)
Quiz
•
4th Grade
45 questions
5th Grade CAASPP Math Review
Quiz
•
5th Grade