placeholder image to represent content

Practical Computer Literacy- Chapter 22

Quiz by Yolande Samuels-Cole

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1
    Any type of intrusive program
  • Q2
    A set of program instructions that can attach itself to a "host" executable software program, such as a game or an office suite component.
    Computer Virus
  • Q3
    a program that seems to perform one function while actually doing something else.
    Trojan Horse
  • Q4
    A malicious software designed to spread from computer to computer over local area networks and the internet.
    Computer Worms
  • Q5
    Utility software that looks for and eradicates viruses, Trojan horses, worms, and other malware
    Antivirus Software
  • Q6
    A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.
    virus signature
  • Q7
    A devices used to interconnect two networks
  • Q8
    An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port scan
    Port Probe
  • Q9
    designed to analyze the flow of traffic entering your computer from a network
    Firewall Software
  • Q10
    Wi-Fi Protected Access- Offer stronger protection by making sure that packets have not been intercepted or tampered within any way.
  • Q11
    personal mode; type of WPA used on most home networks
    PSK (pre-shared key)
  • Q12
    Used to encrypt and decrypt data.
    Encryption Key
  • Q13
    A crime that involves someone pretending to be another person in order to steal money or obtain benefits
    Identity Theft
  • Q14
    software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Secretly gathers information and relays it to advertisers or other interested parties.
  • Q15
    tiny hidden graphic embedded in a webpage
    Web Bug

Teachers give this quiz to your class