Search Header Logo

225-250

Authored by Akzeinepkhanym Sagyndykova

Architecture

University

Used 2+ times

225-250
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital signature?

  the resulting cryptographic (encryption) transformation of information using a private key signature props electronic document designed to protect the document from forgery, as well as from unauthorized changes

data protection is to ensure not cryptographic methods of safety information (data) to be protection in accordance with applicable law, the application of technical, software and software and hardware

  protection of information by legal methods, including the development of legislative and regulatory documents (acts) that regulate subjects regarding the protection of information, the use of these documents

a subject who illegally trying to obtain, modify or destroy data of legitimate users

a program that can reproduce itself, for this purpose, the virus has been attached to any program, as a result, it will be automatically executed during starting of the program

data protection is to ensure not cryptographic methods of safety information (data) to be protection in accordance with applicable law, the application of technical, software and software and hardware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WWW means -

Web Wikipedia Word

  World Wide Word

World Wikipedia Word

World Wide Web 

Wide Web  Word

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.  Data management is…

  an administrative process that includes acquiring, validating, storing, protecting, and processing required data to ensure the accessibility, reliability, and timeliness of the data for its users

he first step toward handling the large volume of data, both structured and unstructured, that floods businesses daily

good at collecting data, they are not managing it well enough to make sense of it

gathering, analyzing, and storing today, companies turn to data management solutions and platforms

  only through data management best practices that organizations are able to harness the power of their data and gain the insights they need to make the data useful

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. The computer hardware is typically divided into …..       main categories

two

  three

five

four

six

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. What is Routers?

A)    connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not pro

connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports

a networking device that forwards packets between networks using information in protocol headers and forwarding tables to determine the best next router for each packet

a numerical identification (logical address) that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes  

an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation

  is a computer network covering a small geographic area, like a home, office, or group of buildings

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

230.Menu is - …

  a rectangular area on the screen where the commonly used applications run

a picture or symbol which is used to represent a software application or hardware device

a symbol such as an arrow which moves around the screen as you move your mouse. Helps you to select objects

a list of options from which the user can choose what they require 

a collection of words and symbols

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.               topology connects one host to the next and the last host to the first. 

Star;

Ring;

Mesh;

Bus;

Hierarchical .

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?