Search Header Logo

Study Guide Part 8 (Module 5)

Authored by KEDRAL TIMMONS

Computers

9th - 12th Grade

Used 1+ times

Study Guide Part 8 (Module 5)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A(n) ______ backup copies only the files that have changed since the last full backup.

differential

incremental

selective

partial

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

IP

EULA

electronic profile

code of conduct

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Social _______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.

manipulation

engineering

hacking

misdirection

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is NOT a green computing recommendation?

Consolidate servers by using virtualization.

Use outside air to cool the data center when possible.

Purchase low-efficiency equipment.

Use sleep modes and other power management features.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Common digital security risks include information theft and system failure.

True

False

Neither

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?