IT9626 unit 3 & 5 Test

IT9626 unit 3 & 5 Test

12th Grade

8 Qs

quiz-placeholder

Similar activities

Apple for my apple apple

Apple for my apple apple

KG - Professional Development

10 Qs

Test Your Knowledge Part 2

Test Your Knowledge Part 2

1st - 12th Grade

10 Qs

Server Quiz

Server Quiz

12th Grade

10 Qs

Python Libraries

Python Libraries

12th Grade

9 Qs

EXIT TICKET

EXIT TICKET

9th - 12th Grade

10 Qs

Current Events Extra Credit Battle - #4

Current Events Extra Credit Battle - #4

11th - 12th Grade

10 Qs

WEEK 8 | TLE-7 (Bread and Pastry Production)

WEEK 8 | TLE-7 (Bread and Pastry Production)

7th - 12th Grade

10 Qs

Technology Use Quiz

Technology Use Quiz

9th - 12th Grade

10 Qs

IT9626 unit 3 & 5 Test

IT9626 unit 3 & 5 Test

Assessment

Quiz

Instructional Technology

12th Grade

Practice Problem

Easy

Created by

Ehtesham Malik

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

OPEN ENDED QUESTION

5 mins • 7 pts

In a recent BBC news bulletin it was said: ‘It takes 82 seconds for cyber-thieves to ensnare the first victim of a phishing campaign, a report suggests.’ ‘Hackers exploit router flaws in unusual pharming attack.’ Describe what is meant by:

(a) phishing 4 marks

(b) pharming 3 marks

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

5 mins • 6 pts

Personal data and other sensitive types of data often need to be kept confidential or restricted to authorised staff. Explain why personal data should be kept confidential (6 marks)

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

10 mins • 8 pts

Phishing is an attempt by fraudsters to gather personal information using email. Receivers of emails should use several different methods to prevent phishing attacks. Evaluate the different methods which can be used to prevent phishing (8 marks)

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 7 pts

Hackers sometimes commit fraud after causing spyware to be installed on other users’ computers.

(a) Describe what is meant by the term ‘spyware’ ( 3 marks)

(b)(b) Explain how a hacker uses the information gained from spyware to commit fraud.( 4 marks)

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

5 mins • 6 pts

Sensors are used in monitoring systems to measure physical variables. It is important that sensors are calibrated before use. (a) Describe, in detail, these sensors and give an appropriate use for each. Each use must be different.

a) Humidity (marks 2)

b)Sound (marks 2)

c) Explain the importance of calibration (marks 2)

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 4 pts

Sensors are used in monitoring and control to measure physical variables. (a) Describe these sensors. For each sensor, explain how it could be used in a control system. Each system must be different.

a)Infrared ( marks 2)

b)Ultrasonic (marks 2)

Evaluate responses using AI:

OFF

7.

CATEGORIZE QUESTION

5 mins • 4 pts

Organize these options into the right categories

Groups:

(a) trojan

,

(b) rootkit

,

(c) spyware

,

(d) virus

it looks harmless

designed to gather information about your interactions with your computer

it infects new files

it is designed to spread much like human virus

in this method peron drops usb so other can take it with curiosity and get victim

enables to gain adminsitrative access

keylogger

it distinguish itself as a legitimate software

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology