IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Professional Development

21 Qs

quiz-placeholder

Similar activities

Adobe Illustrator - Tahap 1

Adobe Illustrator - Tahap 1

Professional Development

20 Qs

bimtek kpps

bimtek kpps

Professional Development

20 Qs

FA Quizz

FA Quizz

Professional Development

20 Qs

PDEC201 - Concepts of Observation/Assessment in ECCE

PDEC201 - Concepts of Observation/Assessment in ECCE

Professional Development

20 Qs

RIESGOS INDIVIDUALES Y COLECTIVOS EN LA IMPRESIÓN DIDGITAL

RIESGOS INDIVIDUALES Y COLECTIVOS EN LA IMPRESIÓN DIDGITAL

Professional Development

20 Qs

CPR_Quiz_Arrays and strings

CPR_Quiz_Arrays and strings

Professional Development

20 Qs

Trivia Abnon Selatan

Trivia Abnon Selatan

Professional Development

16 Qs

DTA Kaun Banega QuizPati - Theme: General Knowledge

DTA Kaun Banega QuizPati - Theme: General Knowledge

Professional Development

20 Qs

IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Medium

Created by

willie reynolds

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a corporate setting, which of the following actions is primarily a concern for confidentiality?

A colleague impersonating another colleague

An unauthorized person eavesdropping on a confidential meeting

A disgruntled employee destructing company property

An employee altering company records without permission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

Patent
Copyright
Watermark
Trademark

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Encryption
Compression
Permissions
Auditing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

Proprietary software
Commercial software
Open source software
Cross-platform software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the basic computing operations?

Input, process, output, and feedback
Input, output, storage, and feedback
Input, process, output, and storage
Input, process, and output

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following internet service types typically provides the fastest speed?

Dial-up
DSL
Satellite
Fiber optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for securing your device?

Using the same password for all accounts
Sharing your password with trusted friends
Regularly updating your software
Writing your password on a sticky note and attaching it to your monitor

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?