Search Header Logo

Chapter 8 IGCSE ICT- Starter Quiz

Authored by Venessa Ragimana

Computers

9th Grade

Used 17+ times

Chapter 8 IGCSE ICT- Starter Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When it comes to Health Risks in Physical Security, which of the following best describes one of the causes of Ozone Irritation?

Having and using laser printers in an office area which leads to dry skin and respiratory problems.

Sitting in front of the computer screen for long periods in the same position.

Continuous use of keyboard or repetitive clicking on mouse buttons.

Staring at a computer screen for too long with incorrect lighting in the room.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a prevention method for Repetitive Strain Injury (RSI)?

Use foot rests to reduce posture problems.

Make use of anti-glare screens

Make use of ergonomics keyboards

Make sure to have proper ventilation in the room.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As part of a Safety Risk Prevention for Electrocution, its is advised that you use an RCB. What does the abbreviation RCB stand for?

Relocate Circuit Base

Residual Current Breaker

Reinforce Circuit Base

Redefine Current Breaker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Covering equipment vents with fabric can cause which safety hazard?

Electrocution

Fire Risk

Trip Hazard

Heavy Equipment Falling

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one prevention method of Hacking?

Hire a professional Hacker to test the weakness of your system.

Download multiple software's from any site.

Re-use the same password for all your login credentials.

Ignoring any unauthorized access to your computer system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of Phishing?

Gaining unauthorized access to a computer system without the user's permission.

Installing malicious code onto a web server or computer to redirect users to a fake website even though they have typed in a legitimate URL.

The user receives an email that looks legitimate but requires the user to click on a link that will take them to a fake website.

A software that is installed to monitor your use of the computer and the key's pressed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of programming code/software which can install and replicate itself on to a computer system without the user's permission is known as?

A hacker

A spyware

A cookie

A virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?