CSC1112 Chapter 11-14

CSC1112 Chapter 11-14

University

35 Qs

quiz-placeholder

Similar activities

Latihan ganjil

Latihan ganjil

9th Grade - University

40 Qs

Mock Revision Quiz 1 Computer Science

Mock Revision Quiz 1 Computer Science

9th Grade - University

31 Qs

COMPUTER NETWORKS-2

COMPUTER NETWORKS-2

University

40 Qs

Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

University

30 Qs

Mid term mock test

Mid term mock test

University

35 Qs

Quiz 2 - Cloud Infrastructure and Virtualization

Quiz 2 - Cloud Infrastructure and Virtualization

University

35 Qs

A+ Module 4 Review

A+ Module 4 Review

University

38 Qs

ICT CSS 10 Q1 EXAM

ICT CSS 10 Q1 EXAM

10th Grade - University

40 Qs

CSC1112 Chapter 11-14

CSC1112 Chapter 11-14

Assessment

Quiz

Computers

University

Easy

Created by

Khayr Rizqy

Used 1+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the main benefit of virtualization?

Improved network security.

Lower hardware costs through better resource usage.

Fewer software bugs.

Longer device battery life.

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which network type is mainly used within a single building or campus?

WAN (Wide Area Network).

LAN (Local Area Network).

MAN (Metropolitan Area Network).

PAN (Personal Area Network).

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

In a peer-to-peer (P2P) network, what is the function of each computer?

Acts only as a client.

Acts only as a server.

Can function as both client and server.

Managed by a central server.

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which type of malicious software replicates itself and spreads through networks or email attachments?

Spyware.

BOT.

Virus.

Phishing.

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which binary format is supported by Linux?

0 and 1.

Binary number format.

ELF number format.

None of the above.

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which of the following is not an open-source operating system?

Ubuntu.

Android.

Linux.

Windows.

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Which OSI model layer handles data encryption?

Physical Layer.

Data Link Layer.

Network Layer.

Presentation Layer.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?