
IT9626 unit 3 & 5 Test
Quiz
•
Instructional Technology
•
12th Grade
•
Practice Problem
•
Easy
Ehtesham Malik
Used 1+ times
FREE Resource
Enhance your content in a minute
8 questions
Show all answers
1.
OPEN ENDED QUESTION
5 mins • 7 pts
In a recent BBC news bulletin it was said: ‘It takes 82 seconds for cyber-thieves to ensnare the first victim of a phishing campaign, a report suggests.’ ‘Hackers exploit router flaws in unusual pharming attack.’ Describe what is meant by:
(a) phishing 4 marks
(b) pharming 3 marks
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
5 mins • 6 pts
Personal data and other sensitive types of data often need to be kept confidential or restricted to authorised staff. Explain why personal data should be kept confidential (6 marks)
Evaluate responses using AI:
OFF
3.
OPEN ENDED QUESTION
10 mins • 8 pts
Phishing is an attempt by fraudsters to gather personal information using email. Receivers of emails should use several different methods to prevent phishing attacks. Evaluate the different methods which can be used to prevent phishing (8 marks)
Evaluate responses using AI:
OFF
4.
OPEN ENDED QUESTION
3 mins • 7 pts
Hackers sometimes commit fraud after causing spyware to be installed on other users’ computers.
(a) Describe what is meant by the term ‘spyware’ ( 3 marks)
(b)(b) Explain how a hacker uses the information gained from spyware to commit fraud.( 4 marks)
Evaluate responses using AI:
OFF
5.
OPEN ENDED QUESTION
5 mins • 6 pts
Sensors are used in monitoring systems to measure physical variables. It is important that sensors are calibrated before use. (a) Describe, in detail, these sensors and give an appropriate use for each. Each use must be different.
a) Humidity (marks 2)
b)Sound (marks 2)
c) Explain the importance of calibration (marks 2)
Evaluate responses using AI:
OFF
6.
OPEN ENDED QUESTION
3 mins • 4 pts
Sensors are used in monitoring and control to measure physical variables. (a) Describe these sensors. For each sensor, explain how it could be used in a control system. Each system must be different.
a)Infrared ( marks 2)
b)Ultrasonic (marks 2)
Evaluate responses using AI:
OFF
7.
CATEGORIZE QUESTION
5 mins • 4 pts
Groups:
(a) trojan
,
(b) rootkit
,
(c) spyware
,
(d) virus
it looks harmless
designed to gather information about your interactions with your computer
it infects new files
it is designed to spread much like human virus
in this method peron drops usb so other can take it with curiosity and get victim
enables to gain adminsitrative access
keylogger
it distinguish itself as a legitimate software
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Resistor Coding
Quiz
•
7th - 12th Grade
10 questions
7.0 DIgital Printing
Quiz
•
10th - 12th Grade
10 questions
BIMESTRAL I (1)- SEXTO
Quiz
•
1st - 12th Grade
10 questions
EMPOWERMENT TECH WEEK 1
Quiz
•
11th - 12th Grade
10 questions
CPA CPF4 Internet Applications
Quiz
•
7th - 12th Grade
10 questions
QUIZ 2 - MEASURING TOOLS & INSTRUMENTS
Quiz
•
9th - 12th Grade
10 questions
Quiz #1: Empowerment Technologies
Quiz
•
11th - 12th Grade
10 questions
AC and DC current
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
