Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

10th Grade

18 Qs

quiz-placeholder

Similar activities

Practice for 8th AP CSP quiz

Practice for 8th AP CSP quiz

10th - 12th Grade

20 Qs

Computer Programming Languages

Computer Programming Languages

8th - 11th Grade

19 Qs

GCSE - Algorithms 1

GCSE - Algorithms 1

9th - 10th Grade

20 Qs

Recap - Languages & Algorithms

Recap - Languages & Algorithms

9th - 12th Grade

18 Qs

Programming Quiz

Programming Quiz

1st - 10th Grade

20 Qs

Programming Languages and Translators

Programming Languages and Translators

10th Grade

22 Qs

GCSE Computer Science Programming Knowledge Check Jan 19

GCSE Computer Science Programming Knowledge Check Jan 19

10th Grade

20 Qs

AQA Computer Science GCSE - 3.1 Fundamentals of algorithms

AQA Computer Science GCSE - 3.1 Fundamentals of algorithms

10th - 12th Grade

15 Qs

Cyber Security , Programming Language & Algorithm Test

Cyber Security , Programming Language & Algorithm Test

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Ashutosh Kumar

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is brute force in the context of cyber threats?

A) A physical attack on computer hardware.

B) When the criminal uses extensive trial and error methods to guess a password or other important information.

C) A method of protecting personal data by encrypting it.

D) Sending unsolicited emails to large numbers of people.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does identity theft involve?

A) Creating a fake identity to play pranks online.

B) A criminal uses someone else's identity or credentials to give them access to information.

C) Forgetting one's own passwords and using someone else's by mistake.

D) Accidentally sharing personal information on social media.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is phishing?

A) When a criminal sends an email that seems legitimate in an effort to get information from you.

B) When a criminal infects a computer with a virus.

C) When a criminal physically steals your computer or phone.

D) When a criminal uses brute force to guess your password.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is smishing?

A) When a criminal uses malware to infect your device.

B) When a criminal sends text messages to try and get personal information from people.

C) When a criminal calls you pretending to be from a legitimate company.

D) When a criminal uses social engineering to trick you in person.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of malware?

A) A text message asking for your personal details.

B) An email that looks legitimate but is actually a scam.

C) Viruses, spyware, and adware.

D) A program that helps to improve computer performance.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is keylogging?

A) A method for encrypting keystrokes to prevent detection.

B) A way of tracking every key and character that is typed on a keyboard.

C) A tool for measuring the speed of typing.

D) A software that helps in correcting typing errors.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does CSS stand for?

Computer Style Sheets

Creative Style System

Cascading Style Sheets

Colorful Style Sheets

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?