Unit 1 Online World Exam Revision

Unit 1 Online World Exam Revision

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Vocab

Cybersecurity Vocab

9th - 12th Grade

10 Qs

Security of Data

Security of Data

11th - 12th Grade

10 Qs

Networks LAN and WAN

Networks LAN and WAN

7th - 12th Grade

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Search engines

Search engines

1st - 12th Grade

10 Qs

Computer Parts Quiz

Computer Parts Quiz

12th Grade

10 Qs

Lesson 4 - Using Email Quiz

Lesson 4 - Using Email Quiz

6th Grade - University

14 Qs

computers

computers

9th - 12th Grade

10 Qs

Unit 1 Online World Exam Revision

Unit 1 Online World Exam Revision

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Desrine Thomas

Used 78+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ishaan, Benjamin, and Isla are discussing about different types of cyber threats. They came across the term 'opportunist threats'. What does it refer to in their discussion?

People like those who find unattended computers in a cafe and steal information

Small programs like viruses that replicate themselves and spread from computer to computer

Emails like phishing emails that attempt to gain access to passwords and financial details

People who purposefully try to gain unauthorized access to systems, like hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Leo, George and Ella are discussing about computer security. George says that computer viruses are people who find unattended computers and steal information. Ella thinks they are emails that attempt to gain access to passwords and financial details. Leo believes they are small programs that replicate themselves and spread from computer to computer. Who is correct?

George

Leo

Ella

None of them

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Muhammad received an email claiming to be from his bank, asking for his password and financial details. This is an example of what?

People like Rohan who find unattended computers and steal information

Small programs that Arthur creates to replicate themselves and spread from computer to computer

Emails that attempt to gain access to passwords and financial details

People like Arthur who purposefully try to gain unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rosie, Aarav, and William are discussing about computer security. William asks, 'What is hacking?'

It's when people find unattended computers in a cafe and steal information

It's about small programs that replicate themselves and spread from computer to computer

It's about emails that attempt to gain access to passwords and financial details

It's when people purposefully try to gain unauthorized access to systems or networks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Isla, Freya, and Rosie were working on a school project when suddenly their computer crashed. They lost all their data. What would you call this incident?

People who find unattended computers and steal information

Small programs that replicate themselves and spread from computer to computer

Emails that attempt to gain access to passwords and financial details

Loss of data due to natural disasters or mishaps

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava, Sophie, and Isla are studying computer science. They come across a term 'Anna Virus'. What is it?

A computer worm

A type of malware

A phishing technique

A hacking tool

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cybersecurity class, Neha was learning about various computer viruses. She came across the Anna Virus and was curious to know who created it. Can you help her?

Jan Duwitt

Sunny

A hacker

A computer virus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?