scsu 50 - 100

scsu 50 - 100

12th Grade

50 Qs

quiz-placeholder

Similar activities

Sim_PraOSK_Informatika_2023_2

Sim_PraOSK_Informatika_2023_2

9th - 12th Grade

51 Qs

Asas Sains Komputer Tingkatan 2 (UJIAN DIAGNOSTIK 2 - 7/10/2024)

Asas Sains Komputer Tingkatan 2 (UJIAN DIAGNOSTIK 2 - 7/10/2024)

12th Grade

50 Qs

Bab 4 Jaringan komputer dan internet. kelompok 5

Bab 4 Jaringan komputer dan internet. kelompok 5

12th Grade

45 Qs

SOAL INFORMATIKA XII

SOAL INFORMATIKA XII

12th Grade

50 Qs

12tkjsmknwidang

12tkjsmknwidang

12th Grade

50 Qs

KK PSKEL 12 RPL 2

KK PSKEL 12 RPL 2

12th Grade

45 Qs

IP Address dan Subnetting

IP Address dan Subnetting

12th Grade

50 Qs

Know Your Keyboard 20 sec

Know Your Keyboard 20 sec

6th Grade - University

46 Qs

scsu 50 - 100

scsu 50 - 100

Assessment

Quiz

Computers

12th Grade

Easy

Created by

saksham verma

Used 60+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Safari is a web browser based on the _______ engine.

A) WebKit

B) NetFront

C) MARTHA

D) Gecko

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer networking, what does DMZ stands for?

A) Demilitarised Zone

B) Dead Man's Zone

C) Decentralized Machine Zone

D) Digital Media Zone

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is URL Spoofing?

A) The process of creating a URL

B) The act of misleading a user to a different website by sending a legitimate-looking URL

C) Downloading proxy servers

D) Securing IP address

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The method of adding geographical metadata to various media such as images, videos, websites, SMS messages, QR codes, or smartphone transmissions is known as:

A) Geometric

B) Geotagging

C) Geostrategy

D) Geopolitics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data security is also called:

A) Information Protection (IP)

B) Information Security (IS)

C) Data Encryption (DE)

D) Data Breach Management (DBM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Clickjacking?

A) The practice of writing malicious code or program that attackers develop to harm or damage users' security

B) The practice of convincing people to reveal confidential information about themselves, friends, relatives, or colleagues

C) The attempt to hide malicious programs in the garb of legitimate buttons or links

D) All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an additional layer of security to your LinkedIn account?

A) Two-step verification

B) Three-step verification

C) Three-step authentication

D) Single-click strategy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers