
IGCSE Computer Science
Authored by Thomas Martinez
Computers
9th - 10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of network attack that tries to prevent legitimate users from accessing a service?
Worm
Denial of Service (DoS)
Trojan
Virus
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Select all the valid non-physical means of securing a network ...
Locking the server room door
Backing up file server data regularly
Authenticating username & password
Setting access control rights for users
Installing and customizing firewall
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the BEST word to complete this sentence?
Hacking is the attempt to gain _______________ access to a computer system and the data is contains.
unregulated
unauthorised
priviliged
backdoor
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The rules that specify how data is transmitted.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data transmission in both directions simultaneously.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the best answer to complete this sentence:
Software refers to the ________ instructions that can be stored on secondary storage devices and loaded into main memory to be executed.
program
written
data
saved
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the best word to complete this sentence:
Operating systems are special programs that control all aspects of a computer's hardware and software and provide an ___________ between the user and the physical machine.
interface
relationship
application
engagement
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?