
0478 5.0 Review
Authored by Robert Morrison
Computers
10th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MATCH QUESTION
1 min • 1 pt
Match the type of malware to its description
Malware code is hidden inside an otherwise legitimate application
Ransomware
Will record user activity, such as keystrokes, and send them back to the hacker
Worm
Self-replicates and damages a system
Spyware
infects a large number of systems via a network
Virus
Will encrypt a system until the user pays to unlock it
Trojan Horse
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the signs that an email is likely to be a phishing attack?
Inconsistent or unusual grammar and tone
Email originates from an unofficial domain
The email arrived at an unusual time of day such as very early morning
Links in the email do not go to an official domain
3.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) attack may involve repeatedly trying to guess a password using a large range of possibilities. On the other hand, (b) relies on tricks and manipulation of people to gain access to a system.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technology can be used to ensure the security of digital currency?
Fetch-Execute Cycle
Blockchain
Machine Learning
Artificial Intelligence
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Cookies can be used for...
Storing usernames and passwords
Remembering customisation preferences
Storing items in a shopping basket
Remembering the IP addresses of popular websites
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does HTML look like?
x = 2
y = 3
z = x + y
int myVar;
myVar = 7;
LDD 45
INC ACC
STO 153
<p>Hello World</p>
7.
DROPDOWN QUESTION
1 min • 1 pt
Web pages are stored on (a) . To access a web server, the web browser must know the (b) of the server. These are hard to remember. Instead, the user types a (c) into the address bar of their browser. This is then sent to a (d) which responds with the IP address of the web server. The web browser and web server then use (e) to communicate. The web server sends the page to the browser to display.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?