PACS

PACS

2nd Grade

80 Qs

quiz-placeholder

Similar activities

Placement Examination

Placement Examination

1st - 3rd Grade

75 Qs

TLJ XI

TLJ XI

1st Grade - University

85 Qs

Year 9 - Term 1 Mega Quiz

Year 9 - Term 1 Mega Quiz

2nd Grade

85 Qs

Operations Team Swiggy

Operations Team Swiggy

KG - Professional Development

85 Qs

Digital Quiz (College)

Digital Quiz (College)

1st - 4th Grade

80 Qs

DASAR-DASAR KOMPUTER

DASAR-DASAR KOMPUTER

1st Grade - University

75 Qs

Yr8 Databases

Yr8 Databases

KG - 5th Grade

80 Qs

TKJ_

TKJ_

1st - 10th Grade

80 Qs

PACS

PACS

Assessment

Quiz

Computers

2nd Grade

Easy

Created by

R Amper

Used 2+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the function of a modem in a computer network?

To convert digital data to analog signals for transmission over a phone line

To display data on the screen

To input data

To process data

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This refers to written text or illustration that explains how the system operates or how to use it.

Documentation

End User

Information and Communication Technology

Information Systems

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which are considered as output devices?

Speakers and printer

Monitor and scanner

Mouse and keyboard

CPU and RAM

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A method of manipulating an individual into performing actions or divulging confidential information.

Pretexting

Tailgating

Social Engineering

Something for something (Quid pro quo)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The ___ key and the ___ key can be used in combination with other keys to perform shortcuts and special tasks.

Control, Alt

Delete, Insert

Function, Toggle

Caps Lock, Num Lock

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a "VPN"?

A type of virus that spreads through emails

A type of backup that creates a copy of data on a remote server

A type of software that encrypts internet traffic and routes it through a remote server

A type of encryption that uses a random key

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Instead of directly stealing the data from the company, malicious attackers alter, change, or modify priceless digital content or sensitive data while it is being transmitted.

Data manipulation

Privilege escalation attacks

Intellectual property theft

Espionage

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?