Module 7 Revision

Is this your test? Login to manage it. If not, you can create a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Why is a firewall used?
2.
1 point
Cyberbullying can happen 24/7, and reach a kid even when he or she is alone.
3.
1 point
There is no difference between the Internet and the WWW.
4.
1 point
A computer can become infected with malware by:
5.
1 point
Monitoring software alerts parents to their children’s online activity without blocking access. It can be used with or without the child’s knowledge.
6.
1 point
Filtering and blocking software is used to:
7.
1 point
Which one of the following is the most likely to infect your computer with
a virus while you are browsing the Internet?
8.
1 point
Which two features indicate that a website is secure?
9.
1 point
Which one of the following describes software that is created and
distributed for malicious purposes?
10.
1 point
A computer _______ is a piece of program designed and written to make additional copies of itself and spread from location to location, typically without user knowledge or permission.
11.
1 point
Which one of the following is a scheme where criminals send unsolicited
e-mail or pop-up messages to get personal and financial information
from unsuspecting victims?
12.
1 point
When subscribing to a website's RSS feed the user will be able to...
13.
1 point
Which one of the following is a digital media file that is downloaded from
the Internet for playback on portable media players and personal
computers?
14.
1 point
What does the term RSS stand for?
15.
1 point
Which type of file can a podcast be?
16.
1 point
Digital Certificates are most important in websites that deal with
17.
1 point
What is a digital certificate?
18.
1 point
Which one of the following is the best method to ensure access to a network is secure?
19.
1 point
What is the method used to translate data into a secret code called?
20.
1 point
Which type of malware secretly place illegal, destructive instructions in the middle of a computer program?
21.
1 point
Which type of malware secretly installs itself on computers and collects
information about users without their knowledge?
22.
1 point
Which one of the following is used by web browsers to locate web sites
on the Internet?
23.
1 point
What does the term WWW stand for?
24.
1 point
Kids who are cyberbullied are more likely to: