ROUND 3

ROUND 3

University

10 Qs

quiz-placeholder

Similar activities

DEMANDA DE AMPARO_21_2

DEMANDA DE AMPARO_21_2

University

15 Qs

Among Us

Among Us

1st Grade - Professional Development

13 Qs

Políticas Públicas para Idosos no Brasil

Políticas Públicas para Idosos no Brasil

University - Professional Development

15 Qs

Kerajaan Tempatan

Kerajaan Tempatan

1st Grade - Professional Development

12 Qs

Bab 2 Koordinat Kartesius Kelas 8

Bab 2 Koordinat Kartesius Kelas 8

12th Grade - University

15 Qs

Global Urban Farming

Global Urban Farming

University

10 Qs

LATIHAN PKB PART 2

LATIHAN PKB PART 2

University - Professional Development

15 Qs

Teaching as Vocation and Profession

Teaching as Vocation and Profession

University

10 Qs

ROUND 3

ROUND 3

Assessment

Quiz

Other

University

Practice Problem

Hard

Created by

Janarthanan Janarthanan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall is a

wall built to prevent fires from damaging a corporate intranet

security device deployed at the boundary of a company to prevent unauthorized physical access

security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

device to prevent all accesses from the internet to the corporate intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By security in e-Commerce we mean

(i) Protecting an organization’s data resource from unauthorized access

(ii)Preventing disasters from happening

(iii) Authenticating messages received by an organization

(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

i, ii

ii, iii

iii, iv

i, iii, iv

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hashing function for digital signature

(i) must give a hashed message which is shorter than the original message

(ii)must be hardware implementable

(iii) two different messages should not give the same hashed message

(iv) is not essential for implementing digital signature

i and ii

ii and iii

i and iii

iii and iv

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can cookies be used to mitigate cross-site scripting?

Cookies can be coded like a program to intercept script attacks.

Cookies store an exact mirror copy of all a users web activity.

Cookies allow for cookie-based user authentication.

They can't. Cookies only store user information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security, functionality, and ease of use triangle illustrates which concept?

As security increases, functionality and ease of use increase.

As security decreases, functionality and ease of use increase.

As security decreases, functionality and ease of use decrease.

Security does not affect functionality and ease of use

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the difference between the given 2 C codes?

No difference as space doesn’t make any difference, values of a, b, d are same in both the case

Space does make a difference, values of a, b, d are different

Program 1 has syntax error, program 2 is not

Program 2 has syntax error, program 1 is not

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

How many times i value is checked in the given C program?


1

2

3

4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?