Untitled form

Untitled form

12 Qs

quiz-placeholder

Similar activities

Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

KG - University

10 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

KG - University

15 Qs

Computer Assesment 1

Computer Assesment 1

4th Grade

15 Qs

Review 1

Review 1

KG - University

17 Qs

Level 5 - Malware Quiz

Level 5 - Malware Quiz

KG - University

10 Qs

SINT: Quiz 3

SINT: Quiz 3

KG - University

10 Qs

Assessment on Computer Hardware and Software

Assessment on Computer Hardware and Software

KG - University

10 Qs

Malware & Anti-Malware Quiz

Malware & Anti-Malware Quiz

KG - University

10 Qs

Untitled form

Untitled form

Assessment

Quiz

others

Easy

Created by

Chi Pham

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q1. To protect a movie, what category of intellectual property would be used?
Trademark
Patent
Service mark
Copyright

2.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q2. Creative Commons licenses are ________.
used mostly for software
irrevocable
temporary
used mostly for movies

3.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q3. ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
Digital rights management
Short message service
E-text
SMTP

4.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q4. Works without copyright protection are in the ________.
public domain
copyleft domain
trademark zone
free use domain

5.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q5. A peer-to-peer (P2P) network is an example of ________ administration.
local
wide area
corporate
central

6.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q6. Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
central operating system (COS)
network operating system (NOS)
multipersonnel operating system (MPOS)
central server operating system (CCOS)

7.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q7. Using a wireless network without the network owner's permission is known as ________.
hijacking
spamming
phishing
piggybacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?