Chapter 9 & 10

Chapter 9 & 10

9th Grade

11 Qs

quiz-placeholder

Similar activities

GCSE Computer Science - 1.8 Ethical and Legal Issues

GCSE Computer Science - 1.8 Ethical and Legal Issues

9th - 11th Grade

14 Qs

1.8 Issues Quiz

1.8 Issues Quiz

9th - 11th Grade

14 Qs

Software

Software

9th - 12th Grade

15 Qs

Network Threats (KS3)

Network Threats (KS3)

9th Grade

11 Qs

Technology

Technology

9th Grade

13 Qs

Y9 Computer Ethics, and Laws

Y9 Computer Ethics, and Laws

9th Grade

15 Qs

OCR GCSE CS MCQs 1.8 Ethics (J276)

OCR GCSE CS MCQs 1.8 Ethics (J276)

9th - 10th Grade

14 Qs

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

9th - 12th Grade

15 Qs

Chapter 9 & 10

Chapter 9 & 10

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Noor Madzlan

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data integrity?

A requirement for data to be accurate

A requirement for data to be available only to authorised users

A law that relates to data privacy

A requirement for data to be available

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these are not a type of malware?

Virus

Worm

Logic bomb

Shareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a activity of malware?

phishing

pharming

keylogger

firewall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these might introduce malware?

off the system abruptly

change the filename of a file

downloading a file from the internet

using a USB cable

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the PC is being used by others, which precautions can you take to protect your data?

Use virus checker

Set a password

Use a harddisk defragmenter

Use a back up software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a threat to the security of a system?

Natural disasters

Unauthorised intrusion into the system by an individual

Malicious software entering the system

A file is saved in the directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You will use ___________ to check the identity of the sender of an email

Software update

Anti virus

Firewall

Digital signature

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?