Test Exam 2 INSY

Test Exam 2 INSY

University

31 Qs

quiz-placeholder

Similar activities

U.S. History A Review-Day Two

U.S. History A Review-Day Two

KG - University

36 Qs

Unit 5 Test (Jackson)

Unit 5 Test (Jackson)

KG - University

32 Qs

Africa Midway Review

Africa Midway Review

KG - University

35 Qs

Articles of Confederation

Articles of Confederation

8th Grade - University

26 Qs

Ancient Egypt Assessment Review

Ancient Egypt Assessment Review

KG - University

26 Qs

Cold War (First 1/2)

Cold War (First 1/2)

KG - University

26 Qs

AP WORLD REVIEW

AP WORLD REVIEW

10th Grade - University

30 Qs

The US Constitution

The US Constitution

KG - University

30 Qs

Test Exam 2 INSY

Test Exam 2 INSY

Assessment

Quiz

History

University

Easy

Created by

Francisco JN

Used 13+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Derivative works

are considered fair use

are not addressed by Creative Commons licenses

can usually be copyrighted as new works

include music mashup recordings

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Chrome OS is considered a thin client because

it depends substantially on processing and storage provided by a remote computer

its kernel is based on an open source operating system

it is distributed under a forked open source software license

it provides security equivalent to that provided by a browser or a cloud storage service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you are working with spreadsheet software, an absolute reference is required for a formula that

adds a fixed processing charge to each price

multiplies quantity by price for each row

calculates the sum of the numbers in a column

determines the time elapsed between two times in each row

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following phrases refers to techniques for improving the ranking and visibility of a Web site?

search engine indexers

search engine optimization

query processors

link popularity factors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The microprocessor receives commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices. These various activities are called

Kernels

Processes

Forks

Scanner

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public key encryption

involves the use of two public keys, one possessed by each party

is risky because the key sent from one party to another can be intercepted

requires one key to encrypt data and a second, different key to decrypt it

is based on HTTP and CSS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What spreadsheet software feature ensures that the results in every cell are accurate for the information currently entered in the worksheet?

what-if analysis

automatic recalculation

relative reference

absolute reference

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?