placeholder image to represent content

4th Quarter Exam in Computer 4

Quiz by Cy Fresto

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
30 questions
Show answers
  • Q1
    What is the exchange of goods and services, usually for money?
    Affiliate Programs
    Commerce
    Enterprise Computing
    Marketing Strategy
    30s
  • Q2
    Which of the following is also known as associate programs, and are a popular part of the e-commerce landscape?
    Affiliate Programs
    Commerce
    Marketing Strategy
    Enterprise Computing
    30s
  • Q3
    Which of the following refers to the process where other people can develop your website for you?
    Enterprise Computing
    Commerce
    Affiliate Programs
    Marketing Strategy
    30s
  • Q4
    Which of the following are embedded in websites and collect information about your browsing preferences?
    Trojans
    Computer Security
    Cookies
    Computer Viruses
    30s
  • Q5
    What is the process of preventing and detecting unauthorized use of a computer?
    Trojans
    Computer Viruses
    Computer Security
    Cookies
    30s
  • Q6
    What are as harmful to a computer as a biological virus is to a human being?
    Computer Security
    Trojans
    Computer Viruses
    Cookies
    30s
  • Q7
    What are these pieces of code hidden in one application and secretly perform malicious activity in the background as the application runs?
    Computer Security
    Trojans
    Cookies
    Computer Viruses
    30s
  • Q8
    What element of commerce is the place where the commercial transaction happens, like a shop inside a mall?
    Ordering Facility
    Product/Service
    Market Place
    Marketing
    30s
  • Q9
    What element of commerce refers to the assistance given to buyers who need technical information about a product?
    Warranty
    Returns
    Technical Support
    Computer Program
    30s
  • Q10
    What type of computer attack attaches itself to another program?
    Denial of Service
    Trojan
    Virus
    Worm
    30s
  • Q11
    Which of the following attacks a computer by disguising itself as something else?
    Worm
    Trojan
    Virus
    Denial of Service
    30s
  • Q12
    What/Who makes computer viruses?
    CPU
    Computers
    Robots
    People
    30s
  • Q13
    Which of the following is not something you should do to protect your computer?
    Download files with file extension .vbs
    Be cautious in using memory cards and flashdrive
    Secure your operating system
    Install antivirus software
    30s
  • Q14
    What type of computer attack copies itself across a computer network again and again?
    Worm
    Virus
    Trojan
    Denial of Service
    30s
  • Q15
    Which of the following is not an example of an antivirus software?
    Norton
    PC-Cillin
    McAfee
    Windows XP
    30s

Teachers give this quiz to your class