
THEORY TEST DBC20012
Authored by Asma Asdayana
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
There are benefits having internet access except.
Information, knowledge, and learning
Address, mapping, and contact information
Selling and making money
Fake news
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Dial-up, Broadband and Wireless are different ways to obtain?
Internet access
Internet appliance
Internet explorer
Internet services
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the ways on how people with disabilities access the internet
Create a special computer accessory for people with disabilities
Access a special software for people with disabilities
Provide machine that provide facilities to access the internet for people with disabilities
Decrease education on internet access and exposure to the disabled
4.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Copyright can be interpreted as
trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime.
a software program that helps people find the information they are looking for online using keywords or phrases.
a type of intellectual property that gives its owner the exclusive right to copy and distribute a creative work, usually for a limited time.
a network that connected computers that the web works on, as well as what emails and files travel across
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As a student you need to choose Web 2.0 tools that are available today. These are the categorized of tools of Web 2.0 except.
Collaboration
Presentation
Communication
Implications
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As a student, we should figure out types of online protection to prevent cybercrime like
Exposed your personal information
Share your internet connection with other
Post anything from your heart
Make online purchases from secure sites
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As an owner of a company, we should take a few necessary precautions to prevent cyber security breaches like
Never comply third party vendor
Limit access to your most valuable data
Let the employees control all the security chain
Never update the application software
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?