Unit 5 POC Part 1

Unit 5 POC Part 1

7th Grade

9 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

7th Grade

10 Qs

Scratch Interface

Scratch Interface

6th - 8th Grade

12 Qs

Elektronická pošta

Elektronická pošta

5th - 10th Grade

10 Qs

Practical Summative Assessment G7-C

Practical Summative Assessment G7-C

7th Grade

10 Qs

Database

Database

6th - 9th Grade

14 Qs

EXPLORADOR DE WINDOWS

EXPLORADOR DE WINDOWS

7th Grade

11 Qs

Revision Quiz 2 - Information Technology

Revision Quiz 2 - Information Technology

7th - 8th Grade

10 Qs

Sistema Operativo

Sistema Operativo

1st - 12th Grade

10 Qs

Unit 5 POC Part 1

Unit 5 POC Part 1

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Jesus Manjarrez

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Basic computer concepts and terminology

is what learning objective?

Participants will understand the internal components of a computer

Participants will gain a broad understanding of major networking

components and concepts

Participants will understand operating system purpose, types, and

security

Participants will understand the basics of virtual computing

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Purpose and use of operating systems

is what Learning Objective?

Participants will gain a broad understanding of major networking

components and concepts

Participants will understand operating system purpose, types, and

security

Participants will understand the basics of virtual computing

Participants will understand the internal components of a computer

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Provide overview of virtual machines, terminology, use, and architecture,

Describe basic security risks for virtual computing (hypervisor, hosts, guests)

is what learning objective?

Participants will understand the internal components of a computer

Participants will gain a broad understanding of major networking

components and concepts

Participants will understand operating system purpose, types, and

security

Participants will understand the basics of virtual computing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Overview of basic network types, concepts, and terms/definitions

is what learning objective

Participants will gain a broad understanding of major networking

components and concepts

Participants will understand operating system purpose, types, and

security

Participants will understand the internal components of a computer

Participants will understand the basics of virtual computing

None of the above.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The central processing unit (CPU)

permanently. Read-only memory (ROM) is read-only and

does not change often.

does the grunt work of the computer.

saves your progress in many different software programs so

that you can access that temporarily saved data later on. RAM is temporary. It is wiped when

you turn off the computer.

Storage allows use to save data more permanently. Read-only memory (ROM) is read-only and

does not change often.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Backdoors

All hardware is susceptible to

flooding, fires, and dust, which can lead to loss of

capability or data if not properly stored or physically

secured.

Can be built into hardware and later get

exploited by attackers.

Some malware can install itself on RAM rather than

the hard drive, making them much more difficult to detect

and eliminate.

Can be attacked through malware that can crash

the BIOS. Also can be accidentally harmed by users using

unauthenticated files to update the files that have

unintended consequences.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Environmental Concerns

Some malware can install itself on RAM rather than

the hard drive, making them much more difficult to detect

and eliminate.

Can be attacked through malware that can crash

the BIOS. Also can be accidentally harmed by users using

unauthenticated files to update the files that have

unintended consequences.

All hardware is susceptible to

flooding, fires, and dust, which can lead to loss of

capability or data if not properly stored or physically

secured.

All hardware is susceptible to

flooding, fires, and dust, which can lead to loss of

capability or data if not properly stored or physically

secured.

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

BIOS

Can be attacked through malware that can crash

the BIOS. Also can be accidentally harmed by users using

unauthenticated files to update the files that have

unintended consequences.

Can be built into hardware and later get

exploited by attackers.

All hardware is susceptible to

flooding, fires, and dust, which can lead to loss of

capability or data if not properly stored or physically

secured.

Some malware can install itself on RAM rather than

the hard drive, making them much more difficult to detect

and eliminate.

9.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

RAM

Can be attacked through malware that can crash

the BIOS. Also can be accidentally harmed by users using

unauthenticated files to update the files that have

unintended consequences.

All hardware is susceptible to

flooding, fires, and dust, which can lead to loss of

capability or data if not properly stored or physically

secured.

Can be built into hardware and later get

exploited by attackers.

Some malware can install itself on RAM rather than

the hard drive, making them much more difficult to detect

and eliminate.