BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

8th Grade

11 Qs

quiz-placeholder

Similar activities

Excel Ribbon

Excel Ribbon

6th - 12th Grade

10 Qs

Google App Basics

Google App Basics

6th - 8th Grade

15 Qs

Malware

Malware

6th - 8th Grade

15 Qs

Soal Analisis Data Kelas 8

Soal Analisis Data Kelas 8

8th Grade

10 Qs

SIMULASI E_LEARNING

SIMULASI E_LEARNING

1st Grade - Professional Development

10 Qs

S3 Database

S3 Database

8th Grade

11 Qs

Huffman Coding

Huffman Coding

6th - 10th Grade

10 Qs

9a1l4 Client Server Worksheet 4

9a1l4 Client Server Worksheet 4

8th Grade

15 Qs

BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Konadu Agyemang

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image
  1. 1. Peer to peer file sharing do not have a central server controlling network.

A. True

B. False

2.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Media Image
  1. 2. Which of the following is not part of the file sharing system

social media

peer to server file sharing

peer to browser file sharing

Access Control

3.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

  1. 3. The act of uploading, adding, inserting and putting in a file like pictures, documents and graphics in an e-mail messages is called.

4.

MULTIPLE SELECT QUESTION

10 sec • 2 pts

  1. 4. Select three information security amongst the following.

data security

data threats

dark web

cybershoot

5.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image
  1. 5. All the following are examples of sensitive data except.

credit card information

username and password

medical record information

trade information

6.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image
  1. 6. This measurement can be done to protect data against threats except.

back up your data

secure your device and network

manage passwords

decryption

7.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

  1. 7. Examples of data threats inn form of physical is...

tampering

damage

data

power

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?