Ict 2112 Short Quiz 2
Ict 2112 Short Quiz 2
Flag question
Question text
You used your smartphone to access Yahoo mail and send an email. In this scenario, your
smartphone is a _____
Select one:
a.
Cloud
b.
Client
c.
Server
d.
Native app
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following can contain malware?
Select one:
a.
Installers
b.
All
c.
Downloads
d.
Emails
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Websites that belong to the Web 1.0 generation were mostly _____
Select one:
a.
Dynamic
b.
Social Media
c.
Native
d.
Static
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following does not need human action to spread?
Select one:
a.
Phishing
b.
Worm
c.
Trojan
d.
Spam
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In our lesson, we visited the website of which movie?
Select one:
a.
Soylent Green
b.
Space Jam
c.
Planet of the Apes
d.
Back to the Future
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a secret group of characters used to unlock your account
Select one:
a.
Phone number
b.
Date of birth
c.
Password
d.
Email address
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is NOT true about Cloud-based services?
Select one:
a.
Subscription to cloud-based services can be upgraded or downgraded.
b.
Cloud-based services can be accessed in different locations using different computers that
are connected to the Internet
c.
People from different places can work with one another through the cloud.
d.
Subscribing to cloud-based services is more expensive than building your own programs
and buying your own servers.
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following statements is true?
Select one:
a.
A computer virus can spread whenever a computer makes contact with another computer.
b.
Usernames are used to determine if you are old enough to access certain contents and
features in the Internet.
c.
Like a virus, spam can make copies of itself in computers that it comes in contact with.
d.
No one can steal your personal information without asking for permission.
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that is disguised as a harmless or useful program or file.
Select one:
a.
Adware
b.
Spam
c.
Worm
d.
Trojan
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In the Internet, your _____ is as good as your actual name.
Select one:
a.
Password
b.
Username
c.
Domain name
d.
Phone number