Practical Computer Literacy- Chapter 22
Quiz by Yolande Samuels-Cole
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1Any type of intrusive programVirus30s
- Q2A set of program instructions that can attach itself to a "host" executable software program, such as a game or an office suite component.Computer Virus30s
- Q3a program that seems to perform one function while actually doing something else.Trojan Horse30s
- Q4A malicious software designed to spread from computer to computer over local area networks and the internet.Computer Worms30s
- Q5Utility software that looks for and eradicates viruses, Trojan horses, worms, and other malwareAntivirus Software30s
- Q6A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.virus signature30s
- Q7A devices used to interconnect two networksGateway30s
- Q8An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port scanPort Probe30s
- Q9designed to analyze the flow of traffic entering your computer from a networkFirewall Software30s
- Q10Wi-Fi Protected Access- Offer stronger protection by making sure that packets have not been intercepted or tampered within any way.WAP30s
- Q11personal mode; type of WPA used on most home networksPSK (pre-shared key)30s
- Q12Used to encrypt and decrypt data.Encryption Key30s
- Q13A crime that involves someone pretending to be another person in order to steal money or obtain benefitsIdentity Theft30s
- Q14software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Secretly gathers information and relays it to advertisers or other interested parties.Spyware30s
- Q15tiny hidden graphic embedded in a webpageWeb Bug30s