BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

8th Grade

11 Qs

quiz-placeholder

Similar activities

Data Representation - Metadata

Data Representation - Metadata

3rd - 11th Grade

10 Qs

Database

Database

8th Grade

10 Qs

Networks - Client server / peer to peer

Networks - Client server / peer to peer

7th - 8th Grade

8 Qs

IBA Chapter 6 (2 of 2)

IBA Chapter 6 (2 of 2)

8th Grade

12 Qs

IBA Chapter 6 (1 of 2)

IBA Chapter 6 (1 of 2)

8th Grade

13 Qs

Networking & the Internet

Networking & the Internet

6th - 8th Grade

15 Qs

Database quiz

Database quiz

8th Grade

16 Qs

S1CPF2 TB Summary Input Process Output

S1CPF2 TB Summary Input Process Output

7th - 10th Grade

10 Qs

BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

BIEMSO 2 D/A JHS BS8 ASSESSMENT QUIZ TERM 3

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Konadu Agyemang

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image
  1. 1. Peer to peer file sharing do not have a central server controlling network.

A. True

B. False

2.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Media Image
  1. 2. Which of the following is not part of the file sharing system

social media

peer to server file sharing

peer to browser file sharing

Access Control

3.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

  1. 3. The act of uploading, adding, inserting and putting in a file like pictures, documents and graphics in an e-mail messages is called.

4.

MULTIPLE SELECT QUESTION

10 sec • 2 pts

  1. 4. Select three information security amongst the following.

data security

data threats

dark web

cybershoot

5.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image
  1. 5. All the following are examples of sensitive data except.

credit card information

username and password

medical record information

trade information

6.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image
  1. 6. This measurement can be done to protect data against threats except.

back up your data

secure your device and network

manage passwords

decryption

7.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

  1. 7. Examples of data threats inn form of physical is...

tampering

damage

data

power

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?