Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

10th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Computer Malware

Computer Malware

6th - 12th Grade

10 Qs

Found. of IT: Security Threats - A

Found. of IT: Security Threats - A

9th - 12th Grade

10 Qs

AQA GCSE Computer Science: Malware

AQA GCSE Computer Science: Malware

10th - 11th Grade

13 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

Malware

Malware

7th - 11th Grade

15 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Quiz 2 for 3rd Grading (TLE-ICT-CSS 10)

Assessment

Quiz

Computers

10th Grade

Medium

Created by

ELVIRA BAD-AN

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A system software that manages computer hardware and software resources, and provides common services for computer programs.

Application Software

Operating System

System Software

Gadget Driver

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What name is given to the person requiring the software?

Organization

User

Client

Company

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It is a program or group of programs designed for end-users.

Application

Antivirus

Windows Store

CD-ROM

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It refers to any intrusive software developed by cybercriminals to steal data and damage or destroy  computers and computer systems.

Application Software

Malware

Antivirus

Gadget Driver

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

If you receive an attachment from someone you don't know, you should never open it.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is attached to an executable file which means it may exist on a system but will not spread until a user opens the infected program.

Virus

Trojan

Spyware

Worms

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

They can replicate themselves and infect multiple computers on a network causing major damage. they often use computer networks to spread slowing down traffic and relying on security failures.

Virus

Trojan

Spyware

Worms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?