
Round 3 -hard
Authored by Chinmai Ballal
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a virtual memory in an operating system?
To slow down the performance of the operating system
To prevent the operating system from accessing the hard drive
To increase the physical memory of the computer
To allow the operating system to use a portion of the hard drive as if it were RAM
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a Divide and Conquer Algorithm?
Heap Sort
Selection Sort
Merge Sort
Binary Sort
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of a database administrator in a database management system?
To manage the hardware of the computer system
To design the user interface of the database system
To write code for the database management system
To manage and maintain the database, including security, performance, and data integrity.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Explain the concept of packet switching in computer networks.
Data is transmitted in a continuous stream without any division
Data is stored in a single large packet and transmitted across the network
Data is transmitted in a circular fashion within the network
Data is broken into small packets and transmitted independently across the network.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the function of a router in a computer network?
Forwarding data packets between computer networks
Encrypting data packets in a computer network
Storing data packets in a computer network
Generating data packets in a computer network
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of iteration in C?
for
while
do-while
all of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the common types of cyber attacks and how can they be prevented?
Using strong passwords, keeping software updated, being cautious of suspicious emails, and using antivirus software
Clicking on every email attachment without caution
Using weak passwords
Leaving software outdated
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?