KMA ESP: Unit 2

KMA ESP: Unit 2

University

15 Qs

quiz-placeholder

Similar activities

BAB 6 ANALISIS DATA B. Perkakas Pengolah Lembar Kerja

BAB 6 ANALISIS DATA B. Perkakas Pengolah Lembar Kerja

7th Grade - University

20 Qs

Understanding Database Technologies, Relational Model, and Data

Understanding Database Technologies, Relational Model, and Data

University

20 Qs

DB-Quiz1

DB-Quiz1

University

10 Qs

CLC Lesson 8&9 Quiz

CLC Lesson 8&9 Quiz

University

12 Qs

Ciberseguridad

Ciberseguridad

University

12 Qs

Digitalization and Development

Digitalization and Development

University

20 Qs

Artificial Intelligence: What's going on ?! Speedy Quiz !

Artificial Intelligence: What's going on ?! Speedy Quiz !

University

15 Qs

KMA ESP: Unit 2

KMA ESP: Unit 2

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Lia Kor

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why don’t any individuals and organizations purchase software as mandated by the owner’s license agreements?

Because organizations prefer to develop their own software instead of buying.

Because software license agreements do not have any legal restrictions.

Because most software is licensed to a particular purchaser, its use is restricted to a single user or to a designated user in an organization .

Because software licenses do not typically restrict usage to a specific purchaser or designated user.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

______ hide their true nature and reveal their designed behavior only when activated?

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the statements that are TRUE

There are only 2 existing software attacks: virus and backdoor

Software components or programs of malicious code are designed to damage, destroy, or deny service to the target systems.

An expert hacker is usually a master of several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system.

Answer explanation

There are many software attacks: Virus, worm, trojan horses, back door or trap door,…

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is IP (Intellectual Property)?

IP is defined as “the unrestricted right to use and share ideas without any ownership or control over their tangible or virtual representation. Anyone can freely use another person’s intellectual property without permission, payment, or credit to the source.”

IP is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source.”

IP is an abbreviated way of "Internet Protocol"

IP is defined as “the lawful right to use and share ideas without any ownership or control over their tangible or virtual representation. Anyone can freely use another person’s intellectual property without permission, payment, or credit to the source.”

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are hackers?

people who use and create mobile software to gain access to information lawfully

people who use and create computer software to gain access to information legally

people who use and create mobile software to gain access to information illegally

people who use and create computer software to gain access to information illegally

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the most common method of virus transmission is via ______

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Choose the statements that are TRUE

Before a Trojan horse can infect a machine, the user must download the server side of the malicious application.

Trade secrets, copyrights, trademarks, and patents are often considered Intellectual property.

When an organization places its Web servers in the care of a Web hosting provider, that provider assumes responsibility for all Internet services and for the hardware and operating system software used to operate the Web site.

There are two skill levels among hackers. The first is the expert hacker, or elite hacker and the novice or unskilled hacker.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?