
Study Guide Part 8 (Module 5)
Authored by KEDRAL TIMMONS
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A(n) ______ backup copies only the files that have changed since the last full backup.
differential
incremental
selective
partial
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
IP
EULA
electronic profile
code of conduct
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Social _______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.
manipulation
engineering
hacking
misdirection
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following is NOT a green computing recommendation?
Consolidate servers by using virtualization.
Use outside air to cool the data center when possible.
Purchase low-efficiency equipment.
Use sleep modes and other power management features.
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Common digital security risks include information theft and system failure.
True
False
Neither
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?