1.1 What type of assaults are used by cybercriminals, using either one or more computers against one or more people? (1)
Blog
INSTRUCTIONS: 1. ALL questions will be answered in the qu…
INSTRUCTIONS: 1. ALL questions will be answered in the quiz. 2. You will get a full 45 minutes to complete the test. You will use all the time to answer the test. 3. Read through each question properly and think carefully about what you need to do. 4. Double-check answers by going through each question carefully. 5. I wish you all the best for this test!
1.3 Lying to someone to gain their trust, so that they rev…
1.3 Lying to someone to gain their trust, so that they reveal personal information about themselves. (1)
9. The average life of a platelet is:
9. The average life of a platelet is:
16. Which of the following is NOT a Vitamin K dependent fact…
16. Which of the following is NOT a Vitamin K dependent factor?
7. The interaction of glycoprotein IIb/IIIa to other IIb/III…
7. The interaction of glycoprotein IIb/IIIa to other IIb/IIIa glycoproteins is involved in what platelet process?
1.5 Mbunye receives a call from a banking consultant requi…
1.5 Mbunye receives a call from a banking consultant requiring banking account details. The consultant pretends to be phoning from the bank, but is a thief, using the bank as a front to get account details. This is an example of? (1)
2.3 Sally-Ann is struggling to draw money from an ATM. She…
2.3 Sally-Ann is struggling to draw money from an ATM. She asks the person behind her in the queue to help her. This is acceptable. (1)
2.2 Sending photos and personal details of yourself is acc…
2.2 Sending photos and personal details of yourself is acceptable. (1)
2.1 Lulu is part of an online chat group. One user is targe…
2.1 Lulu is part of an online chat group. One user is targeting Lulu and constantly sending her negative comments. This is an example of online Exclusion. (1)