QUIZ #2

Quiz
•
Computers
•
11th Grade
•
Hard
Marvin Gonzales
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Task requirements are a collection of physical, functional, mental, and administrative requirements that should be met by the right resources, such as personnel, equipment, materials, etc. Below are examples of task requirements except one.
Completion of specific preceding tasks
Strict time limits or financial constraints
The level of skill are not necessary to effectively execute the task.
Specific technologies and methodologies to be utilized
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Refers to the physical components of a computer or any parts of the computer that can be touched.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Is the user interface that allows you to execute specific tasks on your computer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In preparing for the task you have to consider the following except one.
Proper tool selection
Safe use of tools
The right tool be used for the job.
All tools and equipment be kept in good condition with regular maintenance.
Tools and equipment must be operated even not according to the manufacturer’s instructions.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Personal safety is of the highest importance when working with computers. It can be dangerous, and you or others may be injured or killed if proper safety guidelines are not followed. The precautions listed below should be taken before dealing with any computer equipment EXCEPT ONE.
Wear shoes with non-conductive rubber soles to decrease your risk of getting shocked or badly wounded in an electrical mishap.
Do not work on components that are connected to a power source.
When a computer is powered on, do not remove expansion cards.
Remove the jewelry or not when working inside any computer-related equipment is fine.
Be sure that electronic components and water are not mixed.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Is the practice of preventing unwanted access, corruption, or theft of digital information over its entire lifespan.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
___________________ are designed to monitor incoming and outgoing network traffic and decide whether to allow or restrict particular network operations, often based on sophisticated analysis or deep packet inspection (DPI).
EDR
DNS
Firewalls
Cloud-based Security
Email Gateway Security
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

Quiz
•
9th - 12th Grade
10 questions
LATIH

Quiz
•
9th - 12th Grade
10 questions
1.3 Internet (IP, URL, DNS)

Quiz
•
9th Grade - University
15 questions
Cybersecurity Fundamentals Quiz

Quiz
•
10th Grade - University
16 questions
J277 - 1.4 - Network Threats

Quiz
•
10th Grade - University
20 questions
Kuis Packet Tracer Web Server & DNS Server

Quiz
•
11th Grade
10 questions
Домен/Протокол

Quiz
•
11th Grade
13 questions
1.4 Wired and Wireless Networks

Quiz
•
10th - 11th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade