S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

77 Qs

quiz-placeholder

Similar activities

1Z0-1058-23 - Oracle Risk Management Cloud 2023 Implementation Professional

1Z0-1058-23 - Oracle Risk Management Cloud 2023 Implementation Professional

KG - University

80 Qs

Game Design Semester 1 Test Review

Game Design Semester 1 Test Review

KG - University

75 Qs

6th Grade Science - Unit Test

6th Grade Science - Unit Test

6th Grade

77 Qs

2D - Rounding Whole Numbers - GED Math 1 Spring 2024

2D - Rounding Whole Numbers - GED Math 1 Spring 2024

9th - 12th Grade

78 Qs

Lesson 5: Procedures and Airport Ops

Lesson 5: Procedures and Airport Ops

University

81 Qs

S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

Assessment

Quiz

others

Medium

Created by

Blanch Johnson

Used 1+ times

FREE Resource

77 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization creates a disaster recovery plan. Which part would include return procedures?
emergency plan
recovery plan
restoration plan
building plan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the web address of a website begins with https instead of http, what do you know about the website?
It provides security services and information.
It likely is spoofed.
It is secure.
It contains encrypted data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passcode is another term for a(n) __________.
username
PIN
encryption algorithm
passphrase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?
A hardware device that reinforces security settings on a computer or network.
A file recovery method that circumvents the computer or mobile device's network.
An invisible image on a website that, if accidentally clicked; downloads a virus to the user's computer or mobile device.
A program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An iris recognition system uses technology to read patterns in the user's ___________.
fingerprints
eye
signature
face

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use?
light sources
solar
laser beams
radio frequency.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?