.
True
False
True
False
All of the below
Phone number
Email address
ID Card number
True
False
Is a way of catching another person's information in order to expose them
To gain unauthorised access to a computer system without the user knowledge or permission.
Stealing users information at your convenience.
To gain authorised access to a computer system with the user knowledge or permission.
Internet Service Provider
Information System Provider
Internet Security Protocol
Internet Sourcing Provider
Help building communities
Awareness
Connectivity
All of the above
True
False
Upgrade
Remove date
Install
Downgrade
Can create unnecessary traffic flooding the network
Network can become slower
The details can be taken if not careful
All of the above
User filter on your email accounts
Always turn the computer ON and OFF in order to restart
Make sure you are connected to a WiFi
Do NOT check your emails if not necessary
True
False
True
False
Health issues
Creating awareness
Connectivity
All of the above
True
False
Use of Firewalls & keeping strong passwords
Use protection software and keep easy passwords
Hire a professional hacker to test the weakness of your system
Option A & C
High definition Transfer Protocol
Hypertext Topology Protocol
Hypertext Transmission Protocol
Hypertext Transfer Protocol
Pacific Area Network
Protocol Area Network
Portable Area Netwwork
Personal Area Network
Phishing
Pharming
Smishing
Hacking
True
False
VGA and HDMI
VGA, HDMI and USB
VGA, HDMI, USB and LAN
HDMI and display port
Particular vibration syndrome
Phantom vibration syndrome
Premature vibration syndrome
Paralyze vibration syndrome
True
False
Adrenaline
Dopamine
Oxytocin
Endorphins
True
False
Router
Firewall
Antivirus software
Modem
True
False
Quiz Review Timeline (Updated): Mar 18, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.