Search Header Logo

0478 5.0 Review

Authored by Robert Morrison

Computers

10th Grade

Used 6+ times

0478 5.0 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the type of malware to its description

Malware code is hidden inside an otherwise legitimate application

Ransomware

Will record user activity, such as keystrokes, and send them back to the hacker

Worm

Self-replicates and damages a system

Spyware

infects a large number of systems via a network

Virus

Will encrypt a system until the user pays to unlock it

Trojan Horse

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the signs that an email is likely to be a phishing attack?

Inconsistent or unusual grammar and tone

Email originates from an unofficial domain

The email arrived at an unusual time of day such as very early morning

Links in the email do not go to an official domain

3.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   attack may involve repeatedly trying to guess a password using a large range of possibilities. On the other hand, ​ (b)   relies on tricks and manipulation of people to gain access to a system.

brute force
social engineering
malware
phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology can be used to ensure the security of digital currency?

Fetch-Execute Cycle

Blockchain

Machine Learning

Artificial Intelligence

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Cookies can be used for...

Storing usernames and passwords

Remembering customisation preferences

Storing items in a shopping basket

Remembering the IP addresses of popular websites

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does HTML look like?

x = 2

y = 3

z = x + y

int myVar;

myVar = 7;

LDD 45

INC ACC

STO 153

<p>Hello World</p>

7.

DROPDOWN QUESTION

1 min • 1 pt

Web pages are stored on ​ (a)   . To access a web server, the web browser must know the ​ (b)   of the server. These are hard to remember. Instead, the user types a ​ (c)   into the address bar of their browser. This is then sent to a ​ (d)   which responds with the IP address of the web server. The web browser and web server then use ​ (e)   to communicate. The web server sends the page to the browser to display.

web servers
IP address
URL
DNS server
HTTP
MAC address
File Server
HTML
TCP
the internet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?