ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Grade 9 A & C
ICT Test from 10%
Choose the best answer from the given alternative.
1. ____ means protecting computer systems which communicate
over the computer networks.
A. Application security C. Information Security
B. Cyber Security D. Network Security
2. Data may not be wrongly changed and should be correct,
authentic and reliable means
A. Confidentiality C. Integrity
B. Availability D. All
3. One of the following attacks are not popularized with the
dominance of the Internet as a service platform
A. Password Attack C. Denial of Service
D. Malware attack D. SQL injection
4. Which one of the following can be a potential source of a cyber-
attack?
A. Your father C. Online criminal
B. School boys and girls D. All of the above.
5. If once call from CBE bank to update your account and steal your
information that you use; this is _______ attack.
A. Denial of service C. Eavesdropping
B. Social Engineering D. Phishing
6.______is a malware which locks the files and data on the system
and threatens to delete them if not paid.
A. Spyware C. Ransomware
B. Adware D. Botnet
7. Among the following, identify the element which is not
considered in the triad, according to the CIA.
A. Confidentiality C. Integrity
B. Availability D. Authenticity
8. Which one is different from the others?
A. Fire C. Identity theft
B. Computer crime D. Information theft
9. List at least 5 main types of attacks that affect computer
security?

More Related Content

Similar to Assessment with few question Grade 9 A & C.pptx (20)

Trends & Network -Lucifer-Group-3-1.pptx
Trends & Network -Lucifer-Group-3-1.pptxTrends & Network -Lucifer-Group-3-1.pptx
Trends & Network -Lucifer-Group-3-1.pptx
EurikaStephanieOrao
Ìý
ethical hacker certified v05.16.06 426q
ethical hacker certified v05.16.06 426qethical hacker certified v05.16.06 426q
ethical hacker certified v05.16.06 426q
Ambuj Sharma
Ìý
Unit 1 sample test
Unit 1 sample testUnit 1 sample test
Unit 1 sample test
salam2
Ìý
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05
BookStoreLib
Ìý
Contest e-tech badang
Contest e-tech badangContest e-tech badang
Contest e-tech badang
lembads
Ìý
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Virendra Kumar Dubey
Ìý
Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
karthikaparthasarath
Ìý
Matlab Homework Help
Matlab Homework HelpMatlab Homework Help
Matlab Homework Help
Matlab Assignment Experts
Ìý
Midterm exam-empowerment
Midterm exam-empowermentMidterm exam-empowerment
Midterm exam-empowerment
Adrian Buban
Ìý
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
madunix
Ìý
Wa
WaWa
Wa
Tomas Vileikis
Ìý
3 summary
3 summary3 summary
3 summary
Mr Patrick NIYISHAKA
Ìý
SY0-701 PrepKit Exam Dumps
SY0-701 PrepKit Exam DumpsSY0-701 PrepKit Exam Dumps
SY0-701 PrepKit Exam Dumps
bronxfugly43
Ìý
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
MarkCesarVillanueva
Ìý
Final Examination925 North S
Final Examination925 North SFinal Examination925 North S
Final Examination925 North S
ChereCheek752
Ìý
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
ssuser2209e8
Ìý
Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magic
jenie Emmons
Ìý
Csslp
CsslpCsslp
Csslp
Sushil Shakya
Ìý
Latest CompTIA Security+ (SY0-701) Exam Dumps 2024 updated
Latest CompTIA Security+ (SY0-701)  Exam Dumps 2024 updatedLatest CompTIA Security+ (SY0-701)  Exam Dumps 2024 updated
Latest CompTIA Security+ (SY0-701) Exam Dumps 2024 updated
SkillCertProExams
Ìý
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxxEMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
MakiBalisi
Ìý
Trends & Network -Lucifer-Group-3-1.pptx
Trends & Network -Lucifer-Group-3-1.pptxTrends & Network -Lucifer-Group-3-1.pptx
Trends & Network -Lucifer-Group-3-1.pptx
EurikaStephanieOrao
Ìý
ethical hacker certified v05.16.06 426q
ethical hacker certified v05.16.06 426qethical hacker certified v05.16.06 426q
ethical hacker certified v05.16.06 426q
Ambuj Sharma
Ìý
Unit 1 sample test
Unit 1 sample testUnit 1 sample test
Unit 1 sample test
salam2
Ìý
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05
BookStoreLib
Ìý
Contest e-tech badang
Contest e-tech badangContest e-tech badang
Contest e-tech badang
lembads
Ìý
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Virendra Kumar Dubey
Ìý
Midterm exam-empowerment
Midterm exam-empowermentMidterm exam-empowerment
Midterm exam-empowerment
Adrian Buban
Ìý
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
madunix
Ìý
SY0-701 PrepKit Exam Dumps
SY0-701 PrepKit Exam DumpsSY0-701 PrepKit Exam Dumps
SY0-701 PrepKit Exam Dumps
bronxfugly43
Ìý
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
MarkCesarVillanueva
Ìý
Final Examination925 North S
Final Examination925 North SFinal Examination925 North S
Final Examination925 North S
ChereCheek752
Ìý
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
ssuser2209e8
Ìý
Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magic
jenie Emmons
Ìý
Latest CompTIA Security+ (SY0-701) Exam Dumps 2024 updated
Latest CompTIA Security+ (SY0-701)  Exam Dumps 2024 updatedLatest CompTIA Security+ (SY0-701)  Exam Dumps 2024 updated
Latest CompTIA Security+ (SY0-701) Exam Dumps 2024 updated
SkillCertProExams
Ìý
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxxEMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
MakiBalisi
Ìý

Recently uploaded (20)

google_developer_group_ramdeobaba_university_EXPLORE_PPT
google_developer_group_ramdeobaba_university_EXPLORE_PPTgoogle_developer_group_ramdeobaba_university_EXPLORE_PPT
google_developer_group_ramdeobaba_university_EXPLORE_PPT
JayeshShete1
Ìý
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptxRAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
JenTeruel1
Ìý
Wireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdfWireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdf
AbhinandanMishra30
Ìý
Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...
dhanashree78
Ìý
autonomous vehicle project for engineering.pdf
autonomous vehicle project for engineering.pdfautonomous vehicle project for engineering.pdf
autonomous vehicle project for engineering.pdf
JyotiLohar6
Ìý
BS_EN_ISO_19650_Detailed_Presentation.pptx
BS_EN_ISO_19650_Detailed_Presentation.pptxBS_EN_ISO_19650_Detailed_Presentation.pptx
BS_EN_ISO_19650_Detailed_Presentation.pptx
VinkuMeena
Ìý
Frankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkundeFrankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkunde
Lisa Emerson
Ìý
How to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using ArduinoHow to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using Arduino
CircuitDigest
Ìý
Lecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptxLecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptx
rabiaatif2
Ìý
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
Ìý
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptxGROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
meneememoo
Ìý
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
sreenath seenu
Ìý
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...
J. Agricultural Machinery
Ìý
Mathematics_behind_machine_learning_INT255.pptx
Mathematics_behind_machine_learning_INT255.pptxMathematics_behind_machine_learning_INT255.pptx
Mathematics_behind_machine_learning_INT255.pptx
ppkmurthy2006
Ìý
Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07
Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07
Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07
Brian Gongol
Ìý
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
Ìý
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
Ìý
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
Ìý
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptxUNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
KesavanT10
Ìý
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdfCS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
PonniS7
Ìý
google_developer_group_ramdeobaba_university_EXPLORE_PPT
google_developer_group_ramdeobaba_university_EXPLORE_PPTgoogle_developer_group_ramdeobaba_university_EXPLORE_PPT
google_developer_group_ramdeobaba_university_EXPLORE_PPT
JayeshShete1
Ìý
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptxRAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
JenTeruel1
Ìý
Wireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdfWireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdf
AbhinandanMishra30
Ìý
Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...
dhanashree78
Ìý
autonomous vehicle project for engineering.pdf
autonomous vehicle project for engineering.pdfautonomous vehicle project for engineering.pdf
autonomous vehicle project for engineering.pdf
JyotiLohar6
Ìý
BS_EN_ISO_19650_Detailed_Presentation.pptx
BS_EN_ISO_19650_Detailed_Presentation.pptxBS_EN_ISO_19650_Detailed_Presentation.pptx
BS_EN_ISO_19650_Detailed_Presentation.pptx
VinkuMeena
Ìý
Frankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkundeFrankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkunde
Lisa Emerson
Ìý
How to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using ArduinoHow to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using Arduino
CircuitDigest
Ìý
Lecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptxLecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptx
rabiaatif2
Ìý
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
Ìý
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptxGROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
meneememoo
Ìý
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
sreenath seenu
Ìý
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...
J. Agricultural Machinery
Ìý
Mathematics_behind_machine_learning_INT255.pptx
Mathematics_behind_machine_learning_INT255.pptxMathematics_behind_machine_learning_INT255.pptx
Mathematics_behind_machine_learning_INT255.pptx
ppkmurthy2006
Ìý
Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07
Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07
Gauges are a Pump's Best Friend - Troubleshooting and Operations - v.07
Brian Gongol
Ìý
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
Ìý
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
Ìý
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
Ìý
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptxUNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
KesavanT10
Ìý
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdfCS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
PonniS7
Ìý

Assessment with few question Grade 9 A & C.pptx

  • 1. Grade 9 A & C ICT Test from 10%
  • 2. Choose the best answer from the given alternative. 1. ____ means protecting computer systems which communicate over the computer networks. A. Application security C. Information Security B. Cyber Security D. Network Security 2. Data may not be wrongly changed and should be correct, authentic and reliable means A. Confidentiality C. Integrity B. Availability D. All 3. One of the following attacks are not popularized with the dominance of the Internet as a service platform A. Password Attack C. Denial of Service D. Malware attack D. SQL injection
  • 3. 4. Which one of the following can be a potential source of a cyber- attack? A. Your father C. Online criminal B. School boys and girls D. All of the above. 5. If once call from CBE bank to update your account and steal your information that you use; this is _______ attack. A. Denial of service C. Eavesdropping B. Social Engineering D. Phishing 6.______is a malware which locks the files and data on the system and threatens to delete them if not paid. A. Spyware C. Ransomware B. Adware D. Botnet
  • 4. 7. Among the following, identify the element which is not considered in the triad, according to the CIA. A. Confidentiality C. Integrity B. Availability D. Authenticity 8. Which one is different from the others? A. Fire C. Identity theft B. Computer crime D. Information theft 9. List at least 5 main types of attacks that affect computer security?