IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Professional Development

21 Qs

quiz-placeholder

Similar activities

Tijoree Glaze quiz

Tijoree Glaze quiz

Professional Development

20 Qs

e-CAT Edisi-89-BSKM 4 (Bab22 : BERBAHAGIALAH ORANG YANG MURNI HATINYA)

e-CAT Edisi-89-BSKM 4 (Bab22 : BERBAHAGIALAH ORANG YANG MURNI HATINYA)

Professional Development

20 Qs

Safety

Safety

University - Professional Development

18 Qs

Latihan PPG PJOK Part 8

Latihan PPG PJOK Part 8

Professional Development

20 Qs

National Mathematics Day 2024

National Mathematics Day 2024

Professional Development

20 Qs

SOAL PRETEST PPG 18

SOAL PRETEST PPG 18

Professional Development

20 Qs

AC C1 - Introduction to Accounting and Conceptual Framework

AC C1 - Introduction to Accounting and Conceptual Framework

Professional Development

20 Qs

Obblighi HACCP

Obblighi HACCP

Professional Development

20 Qs

IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

willie reynolds

Used 7+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a corporate setting, which of the following actions is primarily a concern for confidentiality?

A colleague impersonating another colleague

An unauthorized person eavesdropping on a confidential meeting

A disgruntled employee destructing company property

An employee altering company records without permission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Patent
Copyright
Watermark
Trademark

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Encryption
Compression
Permissions
Auditing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Proprietary software
Commercial software
Open source software
Cross-platform software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the basic computing operations?
Input, process, output, and feedback
Input, output, storage, and feedback
Input, process, output, and storage
Input, process, and output

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following internet service types typically provides the fastest speed?
Dial-up
DSL
Satellite
Fiber optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for securing your device?
Using the same password for all accounts
Sharing your password with trusted friends
Regularly updating your software
Writing your password on a sticky note and attaching it to your monitor

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?