placeholder image to represent content

Practical Computer Literacy- Chapter 22

Quiz by Yolande Samuels-Cole

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1
    Any type of intrusive program
    Virus
    30s
  • Q2
    A set of program instructions that can attach itself to a "host" executable software program, such as a game or an office suite component.
    Computer Virus
    30s
  • Q3
    a program that seems to perform one function while actually doing something else.
    Trojan Horse
    30s
  • Q4
    A malicious software designed to spread from computer to computer over local area networks and the internet.
    Computer Worms
    30s
  • Q5
    Utility software that looks for and eradicates viruses, Trojan horses, worms, and other malware
    Antivirus Software
    30s
  • Q6
    A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.
    virus signature
    30s
  • Q7
    A devices used to interconnect two networks
    Gateway
    30s
  • Q8
    An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port scan
    Port Probe
    30s
  • Q9
    designed to analyze the flow of traffic entering your computer from a network
    Firewall Software
    30s
  • Q10
    Wi-Fi Protected Access- Offer stronger protection by making sure that packets have not been intercepted or tampered within any way.
    WAP
    30s
  • Q11
    personal mode; type of WPA used on most home networks
    PSK (pre-shared key)
    30s
  • Q12
    Used to encrypt and decrypt data.
    Encryption Key
    30s
  • Q13
    A crime that involves someone pretending to be another person in order to steal money or obtain benefits
    Identity Theft
    30s
  • Q14
    software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Secretly gathers information and relays it to advertisers or other interested parties.
    Spyware
    30s
  • Q15
    tiny hidden graphic embedded in a webpage
    Web Bug
    30s

Teachers give this quiz to your class