AP Computer Science Principles

AP Computer Science Principles

10th Grade

33 Qs

quiz-placeholder

Similar activities

ITF 501 - Workstation/OS

ITF 501 - Workstation/OS

9th - 12th Grade

34 Qs

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

Peripheral Devices

Peripheral Devices

7th - 11th Grade

29 Qs

Photoshop ACA

Photoshop ACA

9th - 12th Grade

35 Qs

Unix

Unix

1st Grade - Professional Development

36 Qs

4.3.3 Linux Facts Quiz

4.3.3 Linux Facts Quiz

9th - 12th Grade

30 Qs

block 3_537285

block 3_537285

10th Grade - University

29 Qs

The Internet Quiz Ultimate

The Internet Quiz Ultimate

10th Grade

28 Qs

AP Computer Science Principles

AP Computer Science Principles

Assessment

Quiz

Computers

10th Grade

Medium

Used 672+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of DNS?
It assigns a unique address to every device on the Internet.
It returns the IP address given the name of a website.
It forwards a message from one machine to another.
It has more bits so you can make a longer, unique address.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is IP v4 going to be replaced by IP v6?
IP v6 is easier to use.
IP v4 does not work on old hardware.
IP v4 was not encrypted.
We are running out of IP v4 addresses.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an IP address?
www.google.com
192.168.2.25
1024.2048.64.512.256
A5:D4:23:56:FF:A4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Event?

An action that causes something to happen

An action that doesn’t do anything in the App

An action that will allow you to look up and event

Something that is happening in the calendar

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

According to the domain name (DNS), which of the following is a subdomain of the domain example.com?
about.example.com
example.co.uk
example.com.org
example.org

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information
Paying a bill using a secure electronic payment system
Reserving a hotel room by e-mailing a credit card number to a hotel.
Withdrawing money from a bank account using an automated teller machine (ATM)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes.
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?