Untitled form

Untitled form

12 Qs

quiz-placeholder

Similar activities

Koha Quiz

Koha Quiz

University

10 Qs

ITE 370 - IAS 2 Quiz

ITE 370 - IAS 2 Quiz

KG - University

7 Qs

Level 3 - Network Port and Protocols Quiz

Level 3 - Network Port and Protocols Quiz

KG - University

13 Qs

6 Low Stakes - Networks

6 Low Stakes - Networks

KG - University

11 Qs

Spring Test 2024 for Class V  Form

Spring Test 2024 for Class V Form

KG - University

11 Qs

Level 1 - Software/OS Quiz

Level 1 - Software/OS Quiz

KG - University

9 Qs

Level 1 - Hardware Quiz

Level 1 - Hardware Quiz

KG - University

12 Qs

Untitled form

Untitled form

Assessment

Quiz

others

Easy

Created by

Chi Pham

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q1. To protect a movie, what category of intellectual property would be used?
Trademark
Patent
Service mark
Copyright

2.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q2. Creative Commons licenses are ________.
used mostly for software
irrevocable
temporary
used mostly for movies

3.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q3. ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
Digital rights management
Short message service
E-text
SMTP

4.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q4. Works without copyright protection are in the ________.
public domain
copyleft domain
trademark zone
free use domain

5.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q5. A peer-to-peer (P2P) network is an example of ________ administration.
local
wide area
corporate
central

6.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q6. Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
central operating system (COS)
network operating system (NOS)
multipersonnel operating system (MPOS)
central server operating system (CCOS)

7.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Q7. Using a wireless network without the network owner's permission is known as ________.
hijacking
spamming
phishing
piggybacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?