Digital Info Tech - Additional Terms for Final

Digital Info Tech - Additional Terms for Final

10th Grade

21 Qs

quiz-placeholder

Similar activities

PENGAYAAN ULANGAN HARIAN PYTHOON

PENGAYAAN ULANGAN HARIAN PYTHOON

10th Grade

20 Qs

ELEMEN INFORMATIKA

ELEMEN INFORMATIKA

9th - 12th Grade

20 Qs

Soal Ulangan Internet 8.7

Soal Ulangan Internet 8.7

8th Grade - University

20 Qs

Ulangan Internet Kelas 8.9

Ulangan Internet Kelas 8.9

8th Grade - University

20 Qs

Analisis Data Bab 6

Analisis Data Bab 6

7th Grade - University

18 Qs

PENCEGAHAN DAN PENANGANAN MALWARE

PENCEGAHAN DAN PENANGANAN MALWARE

9th Grade - University

20 Qs

STS X7 SESI 1

STS X7 SESI 1

10th Grade - University

20 Qs

Kuis Dasar Kejuruan TKJ

Kuis Dasar Kejuruan TKJ

10th Grade

20 Qs

Digital Info Tech - Additional Terms for Final

Digital Info Tech - Additional Terms for Final

Assessment

Quiz

Information Technology (IT)

10th Grade

Medium

Created by

Joanne Lowman

Used 1+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Code converting plain, readable text into non-readable text to keep data safe from hackers.

Cipher

Compiler

Debugger

Protocol

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The possibility of malicious attempts to damage data, steal data, disrupt digital life in general or disrupting a computer network.

Cyber Threat

Data Encryption

Cloud Computing

Network Protocol

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The virtual computer world and the online world of computer networks and especially the internet.

Cyberspace

Mainframe

Spreadsheet

Algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The practice of sending emails that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something specific like click on a link that contains malware or go to a fake website.

Phishing Attacks

Brute Force Attacks

Denial of Service

Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A phishing attack targeted to a specific person or persons.

Spear Phishing Attack

Whaling Attack

Vishing Attack

Pharming Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

In a phishing attack, information in the “From” section is falsified, making it appear as it is coming from someone you know.

Email Spoofing

Email Encryption

Email Forwarding

Email Archiving

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Copy legitimate websites to fool you into entering personally identifiable information or login credentials.

Website Cloning

Keylogging

Ransomware

Pharming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?