AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

quiz-placeholder

Similar activities

HTML

HTML

9th - 12th Grade

12 Qs

Grade 11 Term 4 Practice 2

Grade 11 Term 4 Practice 2

11th Grade

10 Qs

Los periféricos del computador

Los periféricos del computador

1st Grade - Professional Development

9 Qs

SHEET QUIZ

SHEET QUIZ

9th - 12th Grade

15 Qs

Pre-Test Pertemuan 5

Pre-Test Pertemuan 5

1st Grade - University

15 Qs

EmTech Q2 Post Test 2

EmTech Q2 Post Test 2

11th Grade

15 Qs

Keyboarding Terms

Keyboarding Terms

9th - 12th Grade

10 Qs

8525 AQA GCSE CS 3.7.1 Introduction to Relational Data

8525 AQA GCSE CS 3.7.1 Introduction to Relational Data

11th Grade

10 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Shane Chavez

Used 144+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

computing innovation

device
application
algorithm

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • Information about an individual that identifies, links, relates, or describes them.

sensitive data (SD)

private information (PI)

confidential details (CD)

  • personally identifiable information (PII)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

Malware
Pharming
Phishing
Spoofing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

Keyrecording

Keytracing

Keyphishing

Keylogging

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • Software intended to damage a computing system or to take partial control over its operation.

Spyware
Malware
Ransomware
Firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • A wireless access point that gives unauthorized access to secure networks.

Rogue access point
Unauthorized gateway
Intruder hotspot
Illegitimate access point

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • A process of encoding messages to keep them secret, so only "authorized" parties can read them.

Encryption
Deciphering
Decryption
Encoding

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?