6.1.5
Malware
Test your knowledge with free interactive questions on Seneca — used by over 10 million students.
Malware
Malware is a program that is written deliberately to cause harm.

Trojan horse
- A Trojan horse is a virus that looks likes proper software.
- A Trojan horse can do damage or access personal information without the user knowing.
- Do NOT download any software or apps without asking a trusted adult.

Phishing
- 'Phishing' is when a website or email appears to be from a reliable website but is not.
- Some emails and sites look real but are ‘phishing’ for personal information.
- The information gained through 'phishing' is often used illegally.
- Do NOT give out any personal information online.
1Computational Thinking & Algorithms
1.1Computational Thinking
1.2Algorithms
1.2.1Algorithms1.2.2Pseudocode1.2.3Flow Diagrams1.2.4Logical Reasoning & Debugging1.2.5Reading Algorithms1.2.6Correcting Algorithms1.2.7Complete the Algorithm1.2.8Search Algorithms1.2.9Linear Search1.2.10Binary Search1.2.11Sort Algorithms1.2.12Bubble Sort1.2.13Insertion Sort1.2.14End of Topic Test - Algorithms
2Programming
2.1Programming Fundamentals
2.1.1Variables & Constants2.1.2Comments2.1.3Input & Output2.1.4Arithmetic Operators2.1.5Relational Operators2.1.6Boolean Operators2.1.7Sequence2.1.8Selection2.1.9Iteration2.1.10Subroutines2.1.11Scope2.1.12Data Types2.1.13Casting2.1.14Arrays2.1.152D Arrays2.1.16Lists2.1.172D Lists2.1.18Strings2.1.19Syntax Errors2.1.20Logic Errors2.1.21Runtime Errors2.1.22End of Topic Test - Programming
2.2Designing Code
3Hardware & Software
3.1Hardware
3.2Software
4Data
5The Internet
6Online Safety & Security
6.1Protecting Yourself Online
Jump to other topics
1Computational Thinking & Algorithms
1.1Computational Thinking
1.2Algorithms
1.2.1Algorithms1.2.2Pseudocode1.2.3Flow Diagrams1.2.4Logical Reasoning & Debugging1.2.5Reading Algorithms1.2.6Correcting Algorithms1.2.7Complete the Algorithm1.2.8Search Algorithms1.2.9Linear Search1.2.10Binary Search1.2.11Sort Algorithms1.2.12Bubble Sort1.2.13Insertion Sort1.2.14End of Topic Test - Algorithms
2Programming
2.1Programming Fundamentals
2.1.1Variables & Constants2.1.2Comments2.1.3Input & Output2.1.4Arithmetic Operators2.1.5Relational Operators2.1.6Boolean Operators2.1.7Sequence2.1.8Selection2.1.9Iteration2.1.10Subroutines2.1.11Scope2.1.12Data Types2.1.13Casting2.1.14Arrays2.1.152D Arrays2.1.16Lists2.1.172D Lists2.1.18Strings2.1.19Syntax Errors2.1.20Logic Errors2.1.21Runtime Errors2.1.22End of Topic Test - Programming
2.2Designing Code
3Hardware & Software
3.1Hardware
3.2Software
4Data
5The Internet
6Online Safety & Security
6.1Protecting Yourself Online
Practice questions on Malware
Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.
- 1What is the name of a virus that looks like proper software?Multiple choice
Unlock your full potential with Seneca Premium
Unlimited access to 10,000+ open-ended exam questions
Mini-mock exams based on your study history
Unlock 800+ premium courses & e-books