Edit Game
Grade 7 Graded Recitation Set B
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public




Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   16  Close
built in antivirus software of windows
Windows security
is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Spyware
is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again
Ransomware
often are disguised as useful software.
Trojans
A ______ is a self-replicating program that is harmful to networks
Worm
are created with malicious intent and sent by attackers
Computer Virus
This security attack refers to events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Data
It is a security attack refers to events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.
Physical
Is Software Designed To Detect, Disable, And Remove Viruses, Worms, And Trojans Before They Infect A Computer.
Antivirus software
It specifies the access permissions related to a file such as read and write.
File access permission
It specifies the task that can be performed on a file such as opening and closing of file.
File operations
It specifies the characteristics of the files such as type, date of last modification, size, location on disk etc.
File attributes
It is a system of interactive visual components for computer software
GUI
Remains the most popular operating system
Microsoft windows
The most important software that runs on a computer
Operating System
It aids the user and the hardware to function and interact with each other
System Software