PACS

PACS

2nd Grade

80 Qs

quiz-placeholder

Similar activities

COMP 2

COMP 2

1st - 2nd Grade

77 Qs

dasar desain grafis

dasar desain grafis

1st - 3rd Grade

78 Qs

IDN Network Competition - Batch 2

IDN Network Competition - Batch 2

1st - 10th Grade

75 Qs

My Reviewer ft. ICT 107

My Reviewer ft. ICT 107

1st - 3rd Grade

77 Qs

EXCEL PARA PRIMARIA

EXCEL PARA PRIMARIA

1st - 5th Grade

82 Qs

History of Computing

History of Computing

2nd - 10th Grade

75 Qs

contaminación tecnologica

contaminación tecnologica

1st - 5th Grade

81 Qs

80 câu còn lại KTHD (gg form)

80 câu còn lại KTHD (gg form)

1st - 5th Grade

80 Qs

PACS

PACS

Assessment

Quiz

Computers

2nd Grade

Easy

Created by

R Amper

Used 2+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the function of a modem in a computer network?

To convert digital data to analog signals for transmission over a phone line

To display data on the screen

To input data

To process data

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This refers to written text or illustration that explains how the system operates or how to use it.

Documentation

End User

Information and Communication Technology

Information Systems

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which are considered as output devices?

Speakers and printer

Monitor and scanner

Mouse and keyboard

CPU and RAM

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A method of manipulating an individual into performing actions or divulging confidential information.

Pretexting

Tailgating

Social Engineering

Something for something (Quid pro quo)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The ___ key and the ___ key can be used in combination with other keys to perform shortcuts and special tasks.

Control, Alt

Delete, Insert

Function, Toggle

Caps Lock, Num Lock

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a "VPN"?

A type of virus that spreads through emails

A type of backup that creates a copy of data on a remote server

A type of software that encrypts internet traffic and routes it through a remote server

A type of encryption that uses a random key

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Instead of directly stealing the data from the company, malicious attackers alter, change, or modify priceless digital content or sensitive data while it is being transmitted.

Data manipulation

Privilege escalation attacks

Intellectual property theft

Espionage

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?