ICT 100 - 150

ICT 100 - 150

University

52 Qs

quiz-placeholder

Similar activities

Soal UTS Cadangan Cloud Computing 2021-2

Soal UTS Cadangan Cloud Computing 2021-2

University

50 Qs

SOAL U4S CLOUD COMPUTING 2022-1

SOAL U4S CLOUD COMPUTING 2022-1

University

50 Qs

NPTEL-CLOUD COMPUTING-PRACTICE TEST-3 2025

NPTEL-CLOUD COMPUTING-PRACTICE TEST-3 2025

University

50 Qs

Latihan Soal-Soal UAS Cloud Computing-2022-1

Latihan Soal-Soal UAS Cloud Computing-2022-1

University

50 Qs

NPTEL-CLOUD COMPUTING-PRACTICE TEST-2 2025

NPTEL-CLOUD COMPUTING-PRACTICE TEST-2 2025

University

50 Qs

Quiz 1 Pra UTS Cloud Computing 2021-1

Quiz 1 Pra UTS Cloud Computing 2021-1

University

50 Qs

ИКТ ЖБ100

ИКТ ЖБ100

University

52 Qs

Quiz 7 Cloud Computing-Latihan Soal UTS-2023-1

Quiz 7 Cloud Computing-Latihan Soal UTS-2023-1

University

50 Qs

ICT 100 - 150

ICT 100 - 150

Assessment

Quiz

Computers

University

Hard

Created by

Aiazhan Zhekenova

Used 2+ times

FREE Resource

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Disk cryption will ....

encrypt every single bit of data stored on adisk, Encrypt data stored on disk

requires both the sender and recipient to possess the secret encryption and decryptionkey

overcomes the problem of symetric encryption keys being intercepted by using a pair ofkeys

required by a recipient, the computer will request the digital certificate from the sender

defines the set of rules to follow to encrypt amessage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing data in a specific format is:

SSL

Encryption

Encoding

Coding

TLS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scrambling data so it cannot be understood wihout a decryption key to make it unreadable if intercepted, it is:

Encoding

Encryption

SSL

TLS

Coding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The profection measures in the Internet:

Visit sites of questionable, inappropriate content

Use passwords, which consist only numbers

Install unnecessary services

Do not open emails from unkown suspicious senders, use strong passwords

Basic definitions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Client - server technology is divided into following categories:

Proxies

Servers, Customers

Applications

Computer games

HTML

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The functions of Web - servers are:

The authentication of users

Threating all web - pages

Destruction of dynamic page generation

Interruption of connection with user

Client - server application

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An utility -

is the combination of cloud computing

if defined as the software that is programmed to be accessed over the internet by various portable computing devices

a smart - phone has a recognizable OS

the electronic device

is the packaging of the computing resources, such as computation and storage, as a metered service similar to a traditional public utility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?