WJEC Section 3

WJEC Section 3

10th Grade

65 Qs

quiz-placeholder

Similar activities

Linux Final Exam

Linux Final Exam

9th - 12th Grade

66 Qs

AQA Computer Science GCSE - 3.4 Computer systems

AQA Computer Science GCSE - 3.4 Computer systems

10th - 12th Grade

63 Qs

GCSE Computer Science - Computer Systems

GCSE Computer Science - Computer Systems

10th - 11th Grade

63 Qs

OS inputs, outputs and memory management

OS inputs, outputs and memory management

10th Grade

68 Qs

Mr I's CS (OCR) Paper 1

Mr I's CS (OCR) Paper 1

7th - 10th Grade

66 Qs

BTEC DIT - Component 3

BTEC DIT - Component 3

10th Grade

63 Qs

Computer Fundamentals Form 4 2023

Computer Fundamentals Form 4 2023

9th - 12th Grade

65 Qs

M1:U1 - Final Test - IT Fund+

M1:U1 - Final Test - IT Fund+

9th - 12th Grade

61 Qs

WJEC Section 3

WJEC Section 3

Assessment

Quiz

Computers

10th Grade

Easy

Created by

r tingle

Used 1+ times

FREE Resource

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is accidental damage to data?

Data loss due to hardware failure or human error

Data theft by hackers

Data manipulation by malicious software

Data encryption for security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can cause unintended disclosure of information?

Incorrectly assigned access levels

Data encryption

Data compression

Data redundancy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malicious software?

Virus

Firewall

Encryption

Backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse?

Malicious software disguised as legitimate software

A type of firewall

A data encryption method

A backup system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

Malicious software that encrypts data and demands payment for decryption

Software that protects against viruses

A method of data compression

A type of data backup

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

An attempt to make a network or service unavailable by overwhelming it with traffic

A method of data encryption

A type of data compression

A data backup technique

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is key logging?

Recording keystrokes to capture sensitive information

Encrypting data for security

Compressing data for storage

Backing up data to prevent loss

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?