Search Header Logo

ICDL IT Security Key Terms V

Authored by Daniel Cooke

Computers

10th Grade

Used 4+ times

ICDL IT Security Key Terms V
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of malware that attaches itself to other software to replicate:

V____

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Any piece of software created with the intent to cause disruption or harm:

M_______

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A copy of data that can be used if the original is lost:

B_____

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of malware that causes adverts to pop up or download automatically:

A_____

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of email scam that includes a link in an attempt to steal your details:

P_______

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A type of software created to protect you from malware:

A________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A form of wireless communication (network) that has an effective range up to 10m at its lowest level:

B________

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?