ICT 9/2

ICT 9/2

9th Grade

5 Qs

quiz-placeholder

Similar activities

Asesmen Sumatif "Berpikir Komputasional" - INFORMATIKA

Asesmen Sumatif "Berpikir Komputasional" - INFORMATIKA

7th Grade - University

10 Qs

Uji Pengetahuan Keamanan Data

Uji Pengetahuan Keamanan Data

9th Grade

10 Qs

3RD TERM 2ND C.A.T (I.C.T) YR5

3RD TERM 2ND C.A.T (I.C.T) YR5

5th Grade - University

10 Qs

Kuis Excel

Kuis Excel

9th Grade - University

10 Qs

Quiz Perangkat Keras Komputer

Quiz Perangkat Keras Komputer

7th Grade - University

10 Qs

Latihan Soal Informatika : Berpikir Komputasional - 2

Latihan Soal Informatika : Berpikir Komputasional - 2

7th Grade - University

10 Qs

UHB Informatika Kelas IX

UHB Informatika Kelas IX

9th Grade

10 Qs

REVIEW TIME

REVIEW TIME

9th Grade - University

10 Qs

ICT 9/2

ICT 9/2

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Medium

Created by

John Ganzon

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

the primary protocol used to send data between a web browser and a website

Uniform Resource Locator

HyperText Transfer Protocol Secure

Internet Service Protocol

HyperText Markup Language

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A document written in hypertext (also known as HTML) that you can see online, using a web browser

web page

cookies

cache

spam

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Small text files that websites save to a user's device. They contain information such as user preferences, login details, and other data.

web page

cookies

cache

spam

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems

malware

phishing

cyber threat

data intrusion

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

technique for attempting to acquire sensitive data,

such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person

malware

phishing

cyber threat

data intrusion

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?