Which type of malware asks for money to un-encrypt your data?
Question 8
8.
Which type of malware self-replicates and moves through a network to infect other devices, using up network resources?
Question 9
9.
What security method is often used alongside a username and password system?
Question 10
10.
Sending a fake email that attempts to look legitimate, in order to get users to click a link or take action, is known as what?
Question 11
11.
Using a program to brute-force a password would be considered as what?
Question 12
12.
Using a computer that someone had left logged in would be considered?
Question 13
13.
How is Polyalphabetic encryption more challenging to crack than Caesar's cipher encryption? (tick TWO boxes only!)
Question 14
14.
What is the name of the law in the UK that handles crimes using computers?
Question 15
15.
What type of memory cannot be overwritten and stores the boot-up instructions for the computer?
Question 16
16.
What type of memory stores the programs that are currently in use by the computer and loses all data when the power is switched off?
Question 17
17.
What type of memory is used when available memory is low and is created temporarily by partitioning part of secondary storage?
Question 18
18.
Which component of the CPU is responsible for calling out all of the calculations?
Question 19
19.
Which component of the CPU is responsible for keeping all of the other components in sync?
Question 20
20.
Which of the below is an example of an optical storage device.
Question 21
21.
What is stored in cache memory?
Question 22
22.
Question 23
23.
Which of the below is a character set containing all of the characters on an English language keyboard?
Question 24
24.
What do we call the process of removing all unnecessary information so that we can focus on only the information that is important to our current task?
Question 25
25.
What do we call the process of breaking down problems into manageable chunks?
Question 26
26.
Which shape below is used to represent input or output in a flowchart?
Question 27
27.
Which logic gate is this?
Question 28
28.
Which algorithm below makes room for a piece of data and puts it in the correct place.
Which 2 aspects below, that are usually found in an images meta-data, affect the quality of the digital image? (tick TWO boxes only!)