English

10th

grade

Image

Text Structures 2

9
plays

22 questions

Show Answers
See Preview
  • 1. Multiple Choice
    1 minute
    1 pt

    Not all bugs slither and crawl. A bug can also be an error in a computer program. When a computer tries to read a program with a bug in it, the bug will affect the computer in one of two ways: the computer may process the error and continue running the program. In this case the bug only has a small effect on the computer; however, if the computer cannot process the error, then the bug will cause the computer to freeze and crash. This will require the user to restart the program or the computer. Bugs are pesky to computer programmers and users.

    Cause and effect

    Compare and contrast

    Problem and solution

    Chronological

  • 2. Multiple Choice
    1 minute
    1 pt

    Computers are very complex machines, but everything that they do can be put into two basic categories: inputting and outputting. Inputting is when the computer accepts information entered by the user. Outputting is when the computer returns information to the user. When you press a key on your keyboard, you input information. When the letter that you pressed appears on your monitor, your computer is outputting. Both inputting and outputting require the computer to process information, but input is controlled by the user and output is controlled by the computer. Without inputting and outputting, there would be no computing.

    Compare and contrast

    Sequence/process

    Order of importance/hierarchy

    Chronological

  • 3. Multiple Choice
    1 minute
    1 pt

    Have you ever received an email from a strange address with nothing but a mysterious link in the body? Don’t click that link! It may be a drive-by download attack, a common way of infecting computers. These attacks may start as link in an email or Facebook inbox. If you click the link, your computer browser will connect to a website created to attack computers. Once you have connected with the attack site, it will begin scanning your computer for weaknesses. If it finds a weakness, your computer will begin downloading a harmful file. You will not know that you are downloading this file. It will happen without your knowledge or permission. After the download is complete, the file will run and the attacker will have control of your computer. As you continue browsing the internet, you may not even realize that you have been victimized. The drive-by download attack is one of the most common threats to computer users today.

    Sequence/process

    Chronological

    Cause and effect

    Problem and solution

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?