Digital Solutions - Unit 4 Introduction

Digital Solutions - Unit 4 Introduction

12th Grade

15 Qs

quiz-placeholder

Similar activities

CCNA Module 3

CCNA Module 3

12th Grade

16 Qs

Lesson 18 Vocabuary

Lesson 18 Vocabuary

12th Grade

15 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

OS Revision

OS Revision

9th Grade - University

14 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

8.4 Protection of data

8.4 Protection of data

9th - 12th Grade

20 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

12th Grade

20 Qs

Digital Solutions - Unit 4 Introduction

Digital Solutions - Unit 4 Introduction

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Eula GRAHAM

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the key systems involved in a data exchange solution?

Tick any that apply.

Producer system

Consumer system

Retailer system

Primary system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false?

JSON stands for JavaScript Object Notation.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does API stand for?

Adaptive Programming Interface

Active Program Interface

Applied Program Interface

Application Programming Interface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an API?

A software innovation that enables applications to exchange data and functionality easily, securely, and in real time.

A plain text file that contains instructions for running commands or scripts to run applications or processes, manage files and so on.

An application programming interface.

Answer explanation

While an API is an application programming interface, the correct answer is more accurate.

The plain text file that runs applications or processes, and manages files is a batch file.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all that apply:

In relation to synchronous versus asynchronous communications, the features of synchronous communication include:

This mode of communication is fast.

Users have to wait till the transmission is complete before getting a response.

The start and stop bits are used in transmitting data that imposes extra overhead.

Synchronous transmission needs precisely synchronized clocks for successful exchange.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The "CIA triad" refers to 3 main security risks that should be considered when exchanging data over the internet. CIA stands for:

Consistency, Integrity, Availability.

Confidentiality, Integrity, Availability.

Consistency, Integrity, Authentication

Consistency, Interoperability, Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main techniques developers use to protect against security risks (identified via the CIA triad) are:

Encryption, Authentication, Checksums, Hashing

Encryption, Availability, Confidentiality, Hashing

Enablement, Authentication, Confidentiality,

Hot-spotting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?