Search Header Logo

Unit 1 Online World Exam Revision

Authored by Desrine Thomas

Computers

12th Grade

Used 90+ times

Unit 1 Online World Exam Revision
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ishaan, Benjamin, and Isla are discussing about different types of cyber threats. They came across the term 'opportunist threats'. What does it refer to in their discussion?

People like those who find unattended computers in a cafe and steal information

Small programs like viruses that replicate themselves and spread from computer to computer

Emails like phishing emails that attempt to gain access to passwords and financial details

People who purposefully try to gain unauthorized access to systems, like hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Leo, George and Ella are discussing about computer security. George says that computer viruses are people who find unattended computers and steal information. Ella thinks they are emails that attempt to gain access to passwords and financial details. Leo believes they are small programs that replicate themselves and spread from computer to computer. Who is correct?

George

Leo

Ella

None of them

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Muhammad received an email claiming to be from his bank, asking for his password and financial details. This is an example of what?

People like Rohan who find unattended computers and steal information

Small programs that Arthur creates to replicate themselves and spread from computer to computer

Emails that attempt to gain access to passwords and financial details

People like Arthur who purposefully try to gain unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rosie, Aarav, and William are discussing about computer security. William asks, 'What is hacking?'

It's when people find unattended computers in a cafe and steal information

It's about small programs that replicate themselves and spread from computer to computer

It's about emails that attempt to gain access to passwords and financial details

It's when people purposefully try to gain unauthorized access to systems or networks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Isla, Freya, and Rosie were working on a school project when suddenly their computer crashed. They lost all their data. What would you call this incident?

People who find unattended computers and steal information

Small programs that replicate themselves and spread from computer to computer

Emails that attempt to gain access to passwords and financial details

Loss of data due to natural disasters or mishaps

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava, Sophie, and Isla are studying computer science. They come across a term 'Anna Virus'. What is it?

A computer worm

A type of malware

A phishing technique

A hacking tool

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cybersecurity class, Neha was learning about various computer viruses. She came across the Anna Virus and was curious to know who created it. Can you help her?

Jan Duwitt

Sunny

A hacker

A computer virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?