Search Header Logo

Digital Solutions - Unit 4 Introduction

Authored by Eula GRAHAM

Computers

12th Grade

Used 5+ times

Digital Solutions - Unit 4 Introduction
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the key systems involved in a data exchange solution?

Tick any that apply.

Producer system

Consumer system

Retailer system

Primary system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false?

JSON stands for JavaScript Object Notation.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does API stand for?

Adaptive Programming Interface

Active Program Interface

Applied Program Interface

Application Programming Interface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an API?

A software innovation that enables applications to exchange data and functionality easily, securely, and in real time.

A plain text file that contains instructions for running commands or scripts to run applications or processes, manage files and so on.

An application programming interface.

Answer explanation

While an API is an application programming interface, the correct answer is more accurate.

The plain text file that runs applications or processes, and manages files is a batch file.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all that apply:

In relation to synchronous versus asynchronous communications, the features of synchronous communication include:

This mode of communication is fast.

Users have to wait till the transmission is complete before getting a response.

The start and stop bits are used in transmitting data that imposes extra overhead.

Synchronous transmission needs precisely synchronized clocks for successful exchange.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The "CIA triad" refers to 3 main security risks that should be considered when exchanging data over the internet. CIA stands for:

Consistency, Integrity, Availability.

Confidentiality, Integrity, Availability.

Consistency, Integrity, Authentication

Consistency, Interoperability, Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main techniques developers use to protect against security risks (identified via the CIA triad) are:

Encryption, Authentication, Checksums, Hashing

Encryption, Availability, Confidentiality, Hashing

Enablement, Authentication, Confidentiality,

Hot-spotting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?