S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

77 Qs

quiz-placeholder

Similar activities

Respiratory System

Respiratory System

KG - University

80 Qs

Chapter 16 "Clues to Earth's Past"

Chapter 16 "Clues to Earth's Past"

KG - University

80 Qs

Physics First Semester Exam

Physics First Semester Exam

KG - University

75 Qs

DAA -1

DAA -1

KG - University

79 Qs

Grade 5 Theory Mock Exam (1)

Grade 5 Theory Mock Exam (1)

KG - University

75 Qs

IT220 Test Review

IT220 Test Review

KG - University

80 Qs

CDLE 1/2

CDLE 1/2

KG - University

80 Qs

S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

Assessment

Quiz

others

Medium

Created by

Blanch Johnson

Used 1+ times

FREE Resource

77 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization creates a disaster recovery plan. Which part would include return procedures?
emergency plan
recovery plan
restoration plan
building plan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the web address of a website begins with https instead of http, what do you know about the website?
It provides security services and information.
It likely is spoofed.
It is secure.
It contains encrypted data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passcode is another term for a(n) __________.
username
PIN
encryption algorithm
passphrase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?
A hardware device that reinforces security settings on a computer or network.
A file recovery method that circumvents the computer or mobile device's network.
An invisible image on a website that, if accidentally clicked; downloads a virus to the user's computer or mobile device.
A program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An iris recognition system uses technology to read patterns in the user's ___________.
fingerprints
eye
signature
face

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use?
light sources
solar
laser beams
radio frequency.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?