IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Professional Development

21 Qs

quiz-placeholder

Similar activities

Computer Software

Computer Software

11th Grade - Professional Development

23 Qs

Roles & Responsibilities of Sales Administration

Roles & Responsibilities of Sales Administration

Professional Development

16 Qs

Module 3 unit 5 Using File System

Module 3 unit 5 Using File System

Professional Development

20 Qs

Mobile QE Connect Quiz

Mobile QE Connect Quiz

Professional Development

20 Qs

UF0319 Sistema operativo

UF0319 Sistema operativo

Professional Development

20 Qs

CYCLE 1: FINAL RIVIEW.

CYCLE 1: FINAL RIVIEW.

Professional Development

17 Qs

BCS Network Security Quiz 5

BCS Network Security Quiz 5

University - Professional Development

17 Qs

Core-Abilities Lvl3 M02 Trial-01

Core-Abilities Lvl3 M02 Trial-01

Professional Development

20 Qs

IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

willie reynolds

Used 7+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a corporate setting, which of the following actions is primarily a concern for confidentiality?

A colleague impersonating another colleague

An unauthorized person eavesdropping on a confidential meeting

A disgruntled employee destructing company property

An employee altering company records without permission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Patent
Copyright
Watermark
Trademark

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Encryption
Compression
Permissions
Auditing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Proprietary software
Commercial software
Open source software
Cross-platform software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the basic computing operations?
Input, process, output, and feedback
Input, output, storage, and feedback
Input, process, output, and storage
Input, process, and output

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following internet service types typically provides the fastest speed?
Dial-up
DSL
Satellite
Fiber optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for securing your device?
Using the same password for all accounts
Sharing your password with trusted friends
Regularly updating your software
Writing your password on a sticky note and attaching it to your monitor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?