Search Header Logo

iasiasi

Authored by Rose Gonzalo

World Languages

3rd Grade

Used 1+ times

iasiasi
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

can gain access to sensitive data and then modify, block, or delete the data.

Trojan virus
Worms
Virus
Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

are malicious software that rapidly replicates and spreads to any device within the network.

Trojan virus
Worms
Virus
Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is malicious software attached to a document or file that supports macros to execute its code and spread from host to host.

Trojan virus
Worms
Virus
Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is intrusive software that is designed to damage and destroy computers and computer systems.

Trojan virus
Worms
Virus
Malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of virus deletes all the files that it infects.

Overwrite Virus
Boot Sector Virus
Direct Action Virus
Spacefiller Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of virus infects the master boot record and it is challenging and a complex task to remove this virus and often requires the system to be formatted.

Overwrite Virus
Boot Sector Virus
Direct Action Virus
Spacefiller Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

virus, it gets installed or stays hidden in the computer memory.

Overwrite Virus
Boot Sector Virus
Direct Action Virus
Spacefiller Virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?