Search Header Logo

ITF_U61 qb3

Authored by Senu Eagleu

Computers

University

ITF_U61 qb3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

129 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gam access to the network?

Single-factor

Single sign-on

Permissions

Multifactor

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following language categories is MOST commonly used in databases?

Query

Assembly

Markup

Scripting

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following passwords is the MOST secure?

buzzypresto

BuZZyPr3st0

BuZZyPr3$t0

BuZZyPresto

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following methods of access is MOST likely to be used during a database recovery?

Graphical user interface

Direct

Utility

Programmatic

5.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

A user wants to ensure that a banking site is secure before logging in. Which of the following should the user look for in the URL?

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is an example of structured data?

Video recordings

Social media posts

Photographs

Phone numbers

7.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

A network technician is installing a new mouse for an employee. Which of the following types of cables should the technician use for the mouse?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?