REVIEW M2_2024 GR9

REVIEW M2_2024 GR9

9th Grade

45 Qs

quiz-placeholder

Similar activities

Computer Basics Test

Computer Basics Test

9th - 12th Grade

50 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

Types and Components of computer systems.

Types and Components of computer systems.

9th - 12th Grade

40 Qs

Internet Ethics

Internet Ethics

9th Grade

40 Qs

Computer basics

Computer basics

5th - 9th Grade

50 Qs

Data Security Complete wjec

Data Security Complete wjec

9th Grade

50 Qs

Computing - FInal Super Mega Quiz 2

Computing - FInal Super Mega Quiz 2

9th - 12th Grade

50 Qs

2nd QUARTERLY EXAM in ICT 9, CHS

2nd QUARTERLY EXAM in ICT 9, CHS

9th Grade

50 Qs

REVIEW M2_2024 GR9

REVIEW M2_2024 GR9

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Lê Thủy

Used 5+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of determining whether someone is who they claim to be.

Changeover

Data capture form

Authentication

Biometric

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that attempts to subject the end-user to unwanted advertising.

Authentication

Adware

Validation routines

Biometric

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A variation of phishing that uses a voicemail message to try to trick the user into calling the telephone number contained in the message, with the aim of obtaining personal data.

Virus

Worm

Vishing

Unsubscribe

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fake SMS messages designed to trick users into giving away personal information or installing malware. Similar to phishing.

Skimmer

Copyright

Piracy

Smishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of stand-alone virus that can self-replicate, with the aim of spreading to other computers and corrupting whole networks.

Virus

Worm

Vishing

Unsubscribe

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information used by an algorithm to turn plain text into cipher text.

Decryption key

Primary key field

Record

Encryption key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of key logging software that works by capturing screen images at random intervals.

Screen recorder

Malware

Personal data

Key logging software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?