Random

Random

2nd Grade

7 Qs

quiz-placeholder

Similar activities

Dasar TLJ

Dasar TLJ

1st - 5th Grade

10 Qs

Aspek Hukum dan Dampak Sosial Informatika

Aspek Hukum dan Dampak Sosial Informatika

1st Grade - University

10 Qs

Quiz Pemrograman dan Algoritma

Quiz Pemrograman dan Algoritma

1st Grade - University

10 Qs

Perintah pada debian

Perintah pada debian

2nd Grade

11 Qs

SQL-PHP polączenie

SQL-PHP polączenie

2nd Grade

10 Qs

AYO KERJAKAN SOAL UAS

AYO KERJAKAN SOAL UAS

1st Grade - University

10 Qs

Avvalgi mavzuni takrorlash testi

Avvalgi mavzuni takrorlash testi

1st - 5th Grade

6 Qs

Perangkat Komputer

Perangkat Komputer

1st - 5th Grade

10 Qs

Random

Random

Assessment

Quiz

Information Technology (IT)

2nd Grade

Practice Problem

Hard

Created by

User Friendly

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Backups are stored at a different physical location from the primary data

On-site Storage

Off-site Storage

Cloud Storage

Hybrid Storage Solutions

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Portable storage devices connected via USB or other interfaces, used for local

backups.

Tape Drives

External Hard drives

Network Attached Storage (NAS)

Flash Drives

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A process where the entire system, including the operating system, applications,

and data, is restored from a backup to its state at the time of the backup.

Full System Back up

File Level Back up

Database Back up

Application Backup

4.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

Which of the following is an example of a composite attribute?

Employee ID

Name (First Name, Last Name)

Date of Birth

Phone Number

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It refers to the process of creating copies of data from a database at specific intervals

Back up

Recovery

Incremental

Differential

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Risks posed by individuals within the organization who have authorized access

SQL Injection

Malware

Insider Threats

Data Breaches

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is NOT a problem caused by unnormalized data?

Relation anomaly

Insertion anomaly

Update anomaly

Deletion anomaly

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?