PACS

PACS

2nd Grade

80 Qs

quiz-placeholder

Similar activities

KELAS 2-LATIHAN SOAL SAT INFORMATIKA SM2

KELAS 2-LATIHAN SOAL SAT INFORMATIKA SM2

2nd Grade - University

80 Qs

Yr8 Databases

Yr8 Databases

KG - 5th Grade

80 Qs

Database Essentials

Database Essentials

KG - University

75 Qs

TUX PAINT

TUX PAINT

1st - 5th Grade

75 Qs

simulasi 2

simulasi 2

1st - 12th Grade

75 Qs

Acronyms

Acronyms

KG - 12th Grade

78 Qs

The Inevitable End-of-Year Quiz

The Inevitable End-of-Year Quiz

1st - 12th Grade

79 Qs

Computer Repair Quiz

Computer Repair Quiz

KG - University

80 Qs

PACS

PACS

Assessment

Quiz

Computers

2nd Grade

Easy

Created by

R Amper

Used 2+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the function of a modem in a computer network?

To convert digital data to analog signals for transmission over a phone line

To display data on the screen

To input data

To process data

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This refers to written text or illustration that explains how the system operates or how to use it.

Documentation

End User

Information and Communication Technology

Information Systems

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which are considered as output devices?

Speakers and printer

Monitor and scanner

Mouse and keyboard

CPU and RAM

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A method of manipulating an individual into performing actions or divulging confidential information.

Pretexting

Tailgating

Social Engineering

Something for something (Quid pro quo)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The ___ key and the ___ key can be used in combination with other keys to perform shortcuts and special tasks.

Control, Alt

Delete, Insert

Function, Toggle

Caps Lock, Num Lock

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a "VPN"?

A type of virus that spreads through emails

A type of backup that creates a copy of data on a remote server

A type of software that encrypts internet traffic and routes it through a remote server

A type of encryption that uses a random key

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Instead of directly stealing the data from the company, malicious attackers alter, change, or modify priceless digital content or sensitive data while it is being transmitted.

Data manipulation

Privilege escalation attacks

Intellectual property theft

Espionage

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?