
Coding Quiz 1 - Term 2
Authored by Philip Gilbert
Computers
9th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 2 pts
Specify 2 types of Cyber threats.
(a)
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Which of the following disguises itself as another program while infiltrating your device.
Dark dragon
Snake virus
Trojan horse
EZF Virus
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What method would ensure the removal of a trojan horse?
Uninstalling the infected program.
Running a virus protection scan.
Restarting your device.
Spraying some DOOM on the infested area.
4.
FILL IN THE BLANKS QUESTION
1 min • 2 pts
Supply the correct term for the following:
An " (a) " virus makes full use of the weaknesses in your security software.
5.
FILL IN THE BLANKS QUESTION
1 min • 2 pts
What virus is used to collect data without consent.
(a)
6.
FILL IN THE BLANKS QUESTION
1 min • 2 pts
What virus decreases the operational speed of your device.
(a)
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What type of information does spyware collect.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?