CSEC Information Technology June 2024 Paper1 part 2

CSEC Information Technology June 2024 Paper1 part 2

10th Grade

20 Qs

quiz-placeholder

Similar activities

SM Chapter 1 Cert Exam Review

SM Chapter 1 Cert Exam Review

9th - 12th Grade

16 Qs

Table Notes Quiz

Table Notes Quiz

9th - 12th Grade

20 Qs

12CSC: Software Licensing, Ethics and and SDC

12CSC: Software Licensing, Ethics and and SDC

9th Grade - University

20 Qs

AP CSP Exam Review: Big Idea 3

AP CSP Exam Review: Big Idea 3

8th - 10th Grade

15 Qs

Microsoft PPT. - Scavenger Hunt

Microsoft PPT. - Scavenger Hunt

6th - 12th Grade

20 Qs

IBA Chapter 10A

IBA Chapter 10A

6th - 12th Grade

16 Qs

Logo Creation in Photopea

Logo Creation in Photopea

7th Grade - University

15 Qs

Unit 1:  What is The Web?

Unit 1: What is The Web?

9th - 12th Grade

20 Qs

CSEC Information Technology June 2024 Paper1 part 2

CSEC Information Technology June 2024 Paper1 part 2

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Keith Laban

Used 16+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST efficient file access method to use to authenticate customers when they are logging into their accounts?

Direct

Serial

Random

Sequential

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to use a program stored on a secondary storage device, the program MUST be transferred

Into ROM

Into RAM

Onto a flash drive

Onto an optical disk

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Records on magnetic tape are stored

Directly

Randomly

Sequentially

Indexed-sequentially

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web developer is important to a company because this person

Is responsible for the company’s website

Assigns web addresses to all users in a company

Backs up web files and stores the disks at another location

Monitors the shutting down of competitors’ websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the LEAST reliable instruction for keeping passwords to online accounts secure?

Use only long and strong passwords

Change your passwords on a regular basis

Keep a copy of all passwords on your computer

Create passwords with numbers and special characters

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following examples describe a denial-of-service (DOS) attack?

I. A sudden excessive increase in the number of junk emails

II. Inability to reach regular websites because of too many requests

III. Decrease in network performance because of a flood of transactions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used to ensure that all web pages and servers communicate with each other?

IP

FTP

VoIP

HTTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?