Unit 5 POC Part 1
Quiz
•
Computers
•
7th Grade
•
Hard
Jesus Manjarrez
FREE Resource
Enhance your content in a minute
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Basic computer concepts and terminology
is what learning objective?
Participants will understand the internal components of a computer
Participants will gain a broad understanding of major networking
components and concepts
Participants will understand operating system purpose, types, and
security
Participants will understand the basics of virtual computing
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Purpose and use of operating systems
is what Learning Objective?
Participants will gain a broad understanding of major networking
components and concepts
Participants will understand operating system purpose, types, and
security
Participants will understand the basics of virtual computing
Participants will understand the internal components of a computer
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Provide overview of virtual machines, terminology, use, and architecture,
Describe basic security risks for virtual computing (hypervisor, hosts, guests)
is what learning objective?
Participants will understand the internal components of a computer
Participants will gain a broad understanding of major networking
components and concepts
Participants will understand operating system purpose, types, and
security
Participants will understand the basics of virtual computing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Overview of basic network types, concepts, and terms/definitions
is what learning objective
Participants will gain a broad understanding of major networking
components and concepts
Participants will understand operating system purpose, types, and
security
Participants will understand the internal components of a computer
Participants will understand the basics of virtual computing
None of the above.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The central processing unit (CPU)
permanently. Read-only memory (ROM) is read-only and
does not change often.
does the grunt work of the computer.
saves your progress in many different software programs so
that you can access that temporarily saved data later on. RAM is temporary. It is wiped when
you turn off the computer.
Storage allows use to save data more permanently. Read-only memory (ROM) is read-only and
does not change often.
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Backdoors
All hardware is susceptible to
flooding, fires, and dust, which can lead to loss of
capability or data if not properly stored or physically
secured.
Can be built into hardware and later get
exploited by attackers.
Some malware can install itself on RAM rather than
the hard drive, making them much more difficult to detect
and eliminate.
Can be attacked through malware that can crash
the BIOS. Also can be accidentally harmed by users using
unauthenticated files to update the files that have
unintended consequences.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Environmental Concerns
Some malware can install itself on RAM rather than
the hard drive, making them much more difficult to detect
and eliminate.
Can be attacked through malware that can crash
the BIOS. Also can be accidentally harmed by users using
unauthenticated files to update the files that have
unintended consequences.
All hardware is susceptible to
flooding, fires, and dust, which can lead to loss of
capability or data if not properly stored or physically
secured.
All hardware is susceptible to
flooding, fires, and dust, which can lead to loss of
capability or data if not properly stored or physically
secured.
8.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
BIOS
Can be attacked through malware that can crash
the BIOS. Also can be accidentally harmed by users using
unauthenticated files to update the files that have
unintended consequences.
Can be built into hardware and later get
exploited by attackers.
All hardware is susceptible to
flooding, fires, and dust, which can lead to loss of
capability or data if not properly stored or physically
secured.
Some malware can install itself on RAM rather than
the hard drive, making them much more difficult to detect
and eliminate.
9.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
RAM
Can be attacked through malware that can crash
the BIOS. Also can be accidentally harmed by users using
unauthenticated files to update the files that have
unintended consequences.
All hardware is susceptible to
flooding, fires, and dust, which can lead to loss of
capability or data if not properly stored or physically
secured.
Can be built into hardware and later get
exploited by attackers.
Some malware can install itself on RAM rather than
the hard drive, making them much more difficult to detect
and eliminate.
Similar Resources on Wayground
12 questions
Y7 Networks Homework 1
Quiz
•
7th Grade
10 questions
Business Management
Quiz
•
6th - 8th Grade
8 questions
Linux
Quiz
•
7th Grade
10 questions
KEIRO PROGRAMMING
Quiz
•
4th - 12th Grade
10 questions
Programming Constructs
Quiz
•
5th - 11th Grade
13 questions
Grade 7 - Checkpoint 1 - Term 2
Quiz
•
7th Grade
12 questions
Graph Paper Programming
Quiz
•
7th - 12th Grade
11 questions
HEALTH AND SAFETY 9
Quiz
•
7th - 9th Grade
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
MINERS Core Values Quiz
Quiz
•
8th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
