S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

77 Qs

quiz-placeholder

Similar activities

ICP Fall Semester Exam Study Guide

ICP Fall Semester Exam Study Guide

KG - University

79 Qs

Revision of  LO3.1 Cells Review

Revision of LO3.1 Cells Review

KG - University

79 Qs

FORMULIR MULTIMEDIA PEMBELAJARAN DIGITAL 2025

FORMULIR MULTIMEDIA PEMBELAJARAN DIGITAL 2025

9th - 12th Grade

78 Qs

Practice Chapter 6 Test

Practice Chapter 6 Test

9th - 12th Grade

77 Qs

Government Final Exam Review 2024

Government Final Exam Review 2024

KG - University

80 Qs

SPANISH: VERB SER & PROFESSIONS

SPANISH: VERB SER & PROFESSIONS

KG - University

77 Qs

Mr. Bradley's Respitory

Mr. Bradley's Respitory

9th - 12th Grade

79 Qs

Regulator Functionality and Components Quiz

Regulator Functionality and Components Quiz

12th Grade

78 Qs

S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

Assessment

Quiz

others

Medium

Created by

Blanch Johnson

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

77 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization creates a disaster recovery plan. Which part would include return procedures?
emergency plan
recovery plan
restoration plan
building plan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the web address of a website begins with https instead of http, what do you know about the website?
It provides security services and information.
It likely is spoofed.
It is secure.
It contains encrypted data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passcode is another term for a(n) __________.
username
PIN
encryption algorithm
passphrase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?
A hardware device that reinforces security settings on a computer or network.
A file recovery method that circumvents the computer or mobile device's network.
An invisible image on a website that, if accidentally clicked; downloads a virus to the user's computer or mobile device.
A program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An iris recognition system uses technology to read patterns in the user's ___________.
fingerprints
eye
signature
face

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use?
light sources
solar
laser beams
radio frequency.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?