Internet 1

Internet 1

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Explorando Vistas y Figuras

Explorando Vistas y Figuras

3rd Grade - University

20 Qs

Tecnología 3º ESO

Tecnología 3º ESO

7th - 12th Grade

20 Qs

Brevet Pro  techno : Le portique de lavage

Brevet Pro techno : Le portique de lavage

8th - 9th Grade

20 Qs

RELACIÓN G3 NOVENO

RELACIÓN G3 NOVENO

9th Grade

21 Qs

SCRATCH 2

SCRATCH 2

9th - 12th Grade

20 Qs

ÔN TẬP CN LỚP 4

ÔN TẬP CN LỚP 4

4th Grade - University

20 Qs

TECNOLOGIA GRADO 10° PRIMER PERIODO

TECNOLOGIA GRADO 10° PRIMER PERIODO

10th Grade

20 Qs

Internet 1

Internet 1

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Easy

Created by

LOUIS TAPIA

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A task takes 20 seconds to complete on a single processor. If the task is split perfectly across 4 processors, assuming no overhead or communication delay, how long would the task take to complete?

2 seconds

5seconds

10 seconds

12 seconds

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a parallel computing task with minimal communication overhead, which of the following generally leads to a faster overall processing time?

Increasing the number of processors

Increasing the amount of communication between processors

Increasing the size of the problem

Increasing the overhead for task coordination

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a phishing attack?

Infecting a computer with a virus that corrupts data.

Sending an email that appears to be from a legitimate source to trick individuals into providing personal information

Installing malware through a downloaded file.

Using encryption to protect data during transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a Trojan horse from other types of malware?

It replicates itself and spreads across systems like a worm.

It encrypts files on the victim’s computer and demands a ransom.

It attacks the system's hardware directly.

It disguises itself as a legitimate program but contains harmful code.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of fault tolerance in a computer system?

To prevent any hardware failures from occurring.

To automatically detect and remove viruses from the system.

To avoid the need for backups.

To ensure a system can continue functioning even when one or more components fail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is commonly used to achieve fault tolerance?

Adding redundant components, such as multiple power supplies or hard drives.

Using faster processors.

Decreasing the load on the system by limiting the number of users.

Implementing software updates regularly.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the internet?

A private network used by organizations.

A type of computer used for data storage.

A network of networks that connects millions of computers globally.

A large software program used by companies.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?