Mock 3

Mock 3

KG - 2nd Grade

28 Qs

quiz-placeholder

Similar activities

PH-2 Tema: Jaringan Komputer

PH-2 Tema: Jaringan Komputer

10th Grade

25 Qs

UH-C KJD X TKJ A

UH-C KJD X TKJ A

10th Grade

25 Qs

LAYANAN ISP

LAYANAN ISP

2nd Grade

25 Qs

Post-Test Under Cyber GYAN Project

Post-Test Under Cyber GYAN Project

Professional Development

25 Qs

INF181 Day 5

INF181 Day 5

University

23 Qs

Quiz DNS Server

Quiz DNS Server

11th Grade

25 Qs

LATIHAN ASTS II INFORMATIKA BAB JARINGAN KOMPUTER KELAS 8

LATIHAN ASTS II INFORMATIKA BAB JARINGAN KOMPUTER KELAS 8

8th Grade

30 Qs

Chapter 1

Chapter 1

7th - 8th Grade

30 Qs

Mock 3

Mock 3

Assessment

Quiz

Other

KG - 2nd Grade

Medium

Created by

Sarah Aldossari

Used 11+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

is a feature of MAC OS introduced in Mac OS X Lion which enables the transfer of files among supported Macintosh computers over Wi-Fi and Bluetooth, without using mail or a mass storage device? (N03)

Pressure Drop

Air Drop

iOS Drop

Blue Drop

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

refers to the ease of access and/or use of a product or website. - Unit 26

Accessible

Valuavle

Useful

Usability

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

is part of organization's official regulations and an integral part of system security. (N01)

Network Policy

Password Policy

Internet Usage Policy

Assessment Policy

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What piece of protective equipment is most important when installing a computer hard drive? - Unit 32

Rubber-soled shoes.

A correctly installed NIC card.

A screw driver.

An anti-static wrist band.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technology relies on revolving platters?

Graphics station.

Hard drive.

System switch.

Mobile device.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is Wired Equivalent Privacy (WEP)? (N02)

Security algorithm for wireless networks

Security algorithm for Ethernet

Security algorithm for wired networks

Security algorithm for USB communication

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

includes all processes involved in getting new software or hardware running properly. (N01)

Software Licensing

Software Deployment

Software Uptime

Downtime

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?