Computer Science Quiz

Computer Science Quiz

University

39 Qs

quiz-placeholder

Similar activities

AMADEUS- PRELIM

AMADEUS- PRELIM

University

40 Qs

Transformasi Digital

Transformasi Digital

University

40 Qs

ValEd Midterm Exam2022

ValEd Midterm Exam2022

University

35 Qs

икт 121-160

икт 121-160

University

40 Qs

Digital Communication Draft Quiz

Digital Communication Draft Quiz

University

41 Qs

Preliminary Examination in ProfEd-E 324

Preliminary Examination in ProfEd-E 324

University

35 Qs

GATESSOFT- PRELIM

GATESSOFT- PRELIM

University

40 Qs

SE2 revision pt1.

SE2 revision pt1.

University

43 Qs

Computer Science Quiz

Computer Science Quiz

Assessment

Quiz

Education

University

Medium

Created by

Инаят Нургали

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Statistical or machine learning methods applied to web data such as page views, hits, clicks, and conversions, generally with a view to learning what web presentations are most effective in achieving the organizational:

Web analytics

Data mining

Network analytics

Data analysing

Machine learning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only operation unavailable on the internet in e-banking:

getting cash

to transfer money

to pay bills

to have full information about their accounts

to contact with customer service department

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Internet provider is:

set of rules which helps to get information from another address

a peripheral device that is used to communicate with another computer

an organization engaged in the creation of web-sites

a local administration

the organization provider of Internet services

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first global computer network had a name:

Arpanet

Intranet

BITNet

NSFnet

Mailnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Find biometric data which used for execution of users’ identification/authentication:

fears and prejudices

finger prints

leap motion

eye retina and cornea

data typing from keyboard

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of cryptographic algorithms allows preventing the information leakage by:

digital signature

cryptography requirements

data confidentiality support

authentication support

data integrity support

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A face to cloud computing which helps to guard against down time and determines costs:

Applications

Service level agreements

Bandwidth fees

Virtual private networks

Application programming interfaces

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?