Search Header Logo

Coding Quiz 1 - Term 2

Authored by Philip Gilbert

Computers

9th Grade

Used 2+ times

Coding Quiz 1 - Term 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Specify 2 types of Cyber threats.

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following disguises itself as another program while infiltrating your device.

Dark dragon

Snake virus

Trojan horse

EZF Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What method would ensure the removal of a trojan horse?

Uninstalling the infected program.

Running a virus protection scan.

Restarting your device.

Spraying some DOOM on the infested area.

4.

FILL IN THE BLANK QUESTION

1 min • 2 pts

Supply the correct term for the following:

An "................." virus makes full use of the weaknesses in your security software.

5.

FILL IN THE BLANK QUESTION

1 min • 2 pts

What virus is used to collect data without consent.

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

What virus decreases the operational speed of your device.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What type of information does spyware collect.

Various types of personal information
Weather forecasts
Favorite ice cream flavors
Only public information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?