What are the key systems involved in a data exchange solution?
Tick any that apply.
Digital Solutions - Unit 4 Introduction
Quiz
•
Computers
•
12th Grade
•
Medium
Eula GRAHAM
Used 5+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the key systems involved in a data exchange solution?
Tick any that apply.
Producer system
Consumer system
Retailer system
Primary system
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false?
JSON stands for JavaScript Object Notation.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does API stand for?
Adaptive Programming Interface
Active Program Interface
Applied Program Interface
Application Programming Interface
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an API?
A software innovation that enables applications to exchange data and functionality easily, securely, and in real time.
A plain text file that contains instructions for running commands or scripts to run applications or processes, manage files and so on.
An application programming interface.
Answer explanation
While an API is an application programming interface, the correct answer is more accurate.
The plain text file that runs applications or processes, and manages files is a batch file.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all that apply:
In relation to synchronous versus asynchronous communications, the features of synchronous communication include:
This mode of communication is fast.
Users have to wait till the transmission is complete before getting a response.
The start and stop bits are used in transmitting data that imposes extra overhead.
Synchronous transmission needs precisely synchronized clocks for successful exchange.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The "CIA triad" refers to 3 main security risks that should be considered when exchanging data over the internet. CIA stands for:
Consistency, Integrity, Availability.
Confidentiality, Integrity, Availability.
Consistency, Integrity, Authentication
Consistency, Interoperability, Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The main techniques developers use to protect against security risks (identified via the CIA triad) are:
Encryption, Authentication, Checksums, Hashing
Encryption, Availability, Confidentiality, Hashing
Enablement, Authentication, Confidentiality,
Hot-spotting
10 questions
CyberSecurity Basics
Quiz
•
6th - 12th Grade
20 questions
Module 8 - VPN and IPsec Concepts Review
Quiz
•
12th Grade
13 questions
Computer Networks
Quiz
•
11th - 12th Grade
15 questions
Operating System Components
Quiz
•
12th Grade
16 questions
IBA Chapter 8B
Quiz
•
8th - 12th Grade
15 questions
Cryptography Chap-1
Quiz
•
9th Grade - Professio...
20 questions
General ICT Questions (Part 1)
Quiz
•
5th - 12th Grade
10 questions
Technical Terms - Internet (A-Z) - IPsec
Quiz
•
12th Grade
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
20 questions
Taxes
Quiz
•
9th - 12th Grade
17 questions
Parts of Speech
Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression
Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing
Quiz
•
9th - 12th Grade
10 questions
Identifying equations
Quiz
•
KG - University