
ITF_U61 qb3
Authored by Senu Eagleu
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
129 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gam access to the network?
Single-factor
Single sign-on
Permissions
Multifactor
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following language categories is MOST commonly used in databases?
Query
Assembly
Markup
Scripting
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following passwords is the MOST secure?
buzzypresto
BuZZyPr3st0
BuZZyPr3$t0
BuZZyPresto
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following methods of access is MOST likely to be used during a database recovery?
Graphical user interface
Direct
Utility
Programmatic
5.
FILL IN THE BLANKS QUESTION
2 mins • 1 pt
A user wants to ensure that a banking site is secure before logging in. Which of the following should the user look for in the URL?
(a)
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is an example of structured data?
Video recordings
Social media posts
Photographs
Phone numbers
7.
FILL IN THE BLANKS QUESTION
2 mins • 1 pt
A network technician is installing a new mouse for an employee. Which of the following types of cables should the technician use for the mouse?
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?