TLE ICT

TLE ICT

10th Grade

5 Qs

quiz-placeholder

Similar activities

Komponen Arsitektur Von Neumann

Komponen Arsitektur Von Neumann

10th Grade - University

10 Qs

Quiz tentang jaringan komputer dan internet

Quiz tentang jaringan komputer dan internet

10th Grade

10 Qs

Quiz Webinar: Perbedaan Karir Backend dan Frontend

Quiz Webinar: Perbedaan Karir Backend dan Frontend

9th - 12th Grade

8 Qs

Ms. Word & Ms. Excel

Ms. Word & Ms. Excel

10th Grade

10 Qs

Ice Breaking Informatika

Ice Breaking Informatika

10th Grade - University

10 Qs

ASESMEN "Serangan MitM"

ASESMEN "Serangan MitM"

10th Grade

10 Qs

Post Test VLOOKUP dan HLOOKUP

Post Test VLOOKUP dan HLOOKUP

10th Grade

10 Qs

Asesmen Informatika Fase E Sms Ganjil

Asesmen Informatika Fase E Sms Ganjil

10th Grade

10 Qs

TLE ICT

TLE ICT

Assessment

Quiz

Information Technology (IT)

10th Grade

Practice Problem

Hard

Created by

John Ganzon

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the primary protocol used to send data between a web browser and a website

Uniform Resource Locator

HyperText Transfer Protocol Secure

Internet Service Protocol

HyperText Markup Language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A document written in hypertext (also known as HTML) that you can see online, using a web browser

web page

cookies

cache

spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Small text files that websites save to a user's device. They contain information such as user preferences, login details, and other data.

web page

cookies

cache

spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems

malware

phishing

cyber threat

data intrusion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

technique for attempting to acquire sensitive data,

such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person

malware

phishing

cyber threat

data intrusion

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?