ICT 100 - 150

ICT 100 - 150

University

52 Qs

quiz-placeholder

Similar activities

Rekayasa Perangkat Lunak

Rekayasa Perangkat Lunak

University

50 Qs

Pre-Test NS123

Pre-Test NS123

University

47 Qs

AP CS P 5.1

AP CS P 5.1

10th Grade - University

50 Qs

Data Communication and Network

Data Communication and Network

11th Grade - University

50 Qs

Let's Study NetFund ❦ 2

Let's Study NetFund ❦ 2

University

50 Qs

shell programing

shell programing

University - Professional Development

49 Qs

Pendahuluan Cisco Packet Tracer

Pendahuluan Cisco Packet Tracer

University

55 Qs

Relational Database Design

Relational Database Design

University

47 Qs

ICT 100 - 150

ICT 100 - 150

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Aiazhan Zhekenova

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Disk cryption will ....

encrypt every single bit of data stored on adisk, Encrypt data stored on disk

requires both the sender and recipient to possess the secret encryption and decryptionkey

overcomes the problem of symetric encryption keys being intercepted by using a pair ofkeys

required by a recipient, the computer will request the digital certificate from the sender

defines the set of rules to follow to encrypt amessage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storing data in a specific format is:

SSL

Encryption

Encoding

Coding

TLS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scrambling data so it cannot be understood wihout a decryption key to make it unreadable if intercepted, it is:

Encoding

Encryption

SSL

TLS

Coding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The profection measures in the Internet:

Visit sites of questionable, inappropriate content

Use passwords, which consist only numbers

Install unnecessary services

Do not open emails from unkown suspicious senders, use strong passwords

Basic definitions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Client - server technology is divided into following categories:

Proxies

Servers, Customers

Applications

Computer games

HTML

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The functions of Web - servers are:

The authentication of users

Threating all web - pages

Destruction of dynamic page generation

Interruption of connection with user

Client - server application

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An utility -

is the combination of cloud computing

if defined as the software that is programmed to be accessed over the internet by various portable computing devices

a smart - phone has a recognizable OS

the electronic device

is the packaging of the computing resources, such as computation and storage, as a metered service similar to a traditional public utility

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?