S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

77 Qs

quiz-placeholder

Similar activities

Chemistry Sem 2 Final Review

Chemistry Sem 2 Final Review

University

80 Qs

Gizmos Cell Types

Gizmos Cell Types

KG - University

72 Qs

TRY OUT LOKAL 2 (PS) A16

TRY OUT LOKAL 2 (PS) A16

Professional Development

73 Qs

Las Profesiones Rockalingua

Las Profesiones Rockalingua

7th Grade

72 Qs

CPR Test

CPR Test

9th - 12th Grade

73 Qs

Practice Final  Español 4  2025

Practice Final Español 4 2025

10th Grade

74 Qs

S2 Fundamentals of Computing - A Study Review

S2 Fundamentals of Computing - A Study Review

Assessment

Quiz

others

Practice Problem

Medium

Created by

Blanch Johnson

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

77 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization creates a disaster recovery plan. Which part would include return procedures?

emergency plan
recovery plan
restoration plan
building plan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the web address of a website begins with https instead of http, what do you know about the website?

It provides security services and information.
It likely is spoofed.
It is secure.
It contains encrypted data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passcode is another term for a(n) __________.

username
PIN
encryption algorithm
passphrase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?

A hardware device that reinforces security settings on a computer or network.
A file recovery method that circumvents the computer or mobile device's network.
An invisible image on a website that, if accidentally clicked; downloads a virus to the user's computer or mobile device.
A program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An iris recognition system uses technology to read patterns in the user's ___________.

fingerprints
eye
signature
face

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use?

light sources
solar
laser beams
radio frequency.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?