
Year 10 - Term 1 Assessment 2
Authored by SUMALI VIDANAGE
Computers
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the technique that used by criminals to get personal details and payment details from users through emails?
Phishing
Pharming
Malware
Ransomware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to protect the data from unauthorized access?
Firewalls
Encryption
Passwords
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the software that secretly monitor and records computer data and user inputs?
Virus
Adware
Spyware
None of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password should contain more than 8 characters.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password is a mix of letters and numbers only.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password should change randomly.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Do not use the same password for all the accounts in websites.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?