
Unit 1 Online World Exam Revision
Authored by Desrine Thomas
Computers
12th Grade
Used 90+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ishaan, Benjamin, and Isla are discussing about different types of cyber threats. They came across the term 'opportunist threats'. What does it refer to in their discussion?
People like those who find unattended computers in a cafe and steal information
Small programs like viruses that replicate themselves and spread from computer to computer
Emails like phishing emails that attempt to gain access to passwords and financial details
People who purposefully try to gain unauthorized access to systems, like hackers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Leo, George and Ella are discussing about computer security. George says that computer viruses are people who find unattended computers and steal information. Ella thinks they are emails that attempt to gain access to passwords and financial details. Leo believes they are small programs that replicate themselves and spread from computer to computer. Who is correct?
George
Leo
Ella
None of them
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Muhammad received an email claiming to be from his bank, asking for his password and financial details. This is an example of what?
People like Rohan who find unattended computers and steal information
Small programs that Arthur creates to replicate themselves and spread from computer to computer
Emails that attempt to gain access to passwords and financial details
People like Arthur who purposefully try to gain unauthorized access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rosie, Aarav, and William are discussing about computer security. William asks, 'What is hacking?'
It's when people find unattended computers in a cafe and steal information
It's about small programs that replicate themselves and spread from computer to computer
It's about emails that attempt to gain access to passwords and financial details
It's when people purposefully try to gain unauthorized access to systems or networks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Isla, Freya, and Rosie were working on a school project when suddenly their computer crashed. They lost all their data. What would you call this incident?
People who find unattended computers and steal information
Small programs that replicate themselves and spread from computer to computer
Emails that attempt to gain access to passwords and financial details
Loss of data due to natural disasters or mishaps
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava, Sophie, and Isla are studying computer science. They come across a term 'Anna Virus'. What is it?
A computer worm
A type of malware
A phishing technique
A hacking tool
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a cybersecurity class, Neha was learning about various computer viruses. She came across the Anna Virus and was curious to know who created it. Can you help her?
Jan Duwitt
Sunny
A hacker
A computer virus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?