
4th Quarter Exam in Computer 4
Quiz by Cy Fresto
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
30 questions
Show answers
- Q1What is the exchange of goods and services, usually for money?Affiliate ProgramsCommerceEnterprise ComputingMarketing Strategy30s
- Q2Which of the following is also known as associate programs, and are a popular part of the e-commerce landscape?Affiliate ProgramsCommerceMarketing StrategyEnterprise Computing30s
- Q3Which of the following refers to the process where other people can develop your website for you?Enterprise ComputingCommerceAffiliate ProgramsMarketing Strategy30s
- Q4Which of the following are embedded in websites and collect information about your browsing preferences?TrojansComputer SecurityCookiesComputer Viruses30s
- Q5What is the process of preventing and detecting unauthorized use of a computer?TrojansComputer VirusesComputer SecurityCookies30s
- Q6What are as harmful to a computer as a biological virus is to a human being?Computer SecurityTrojansComputer VirusesCookies30s
- Q7What are these pieces of code hidden in one application and secretly perform malicious activity in the background as the application runs?Computer SecurityTrojansCookiesComputer Viruses30s
- Q8What element of commerce is the place where the commercial transaction happens, like a shop inside a mall?Ordering FacilityProduct/ServiceMarket PlaceMarketing30s
- Q9What element of commerce refers to the assistance given to buyers who need technical information about a product?WarrantyReturnsTechnical SupportComputer Program30s
- Q10What type of computer attack attaches itself to another program?Denial of ServiceTrojanVirusWorm30s
- Q11Which of the following attacks a computer by disguising itself as something else?WormTrojanVirusDenial of Service30s
- Q12What/Who makes computer viruses?CPUComputersRobotsPeople30s
- Q13Which of the following is not something you should do to protect your computer?Download files with file extension .vbsBe cautious in using memory cards and flashdriveSecure your operating systemInstall antivirus software30s
- Q14What type of computer attack copies itself across a computer network again and again?WormVirusTrojanDenial of Service30s
- Q15Which of the following is not an example of an antivirus software?NortonPC-CillinMcAfeeWindows XP30s