CSI104 FE FALL 2023

CSI104 FE FALL 2023

University

60 Qs

quiz-placeholder

Similar activities

 CSC 113 - Computer Programming 2

CSC 113 - Computer Programming 2

University

60 Qs

Computer Architecture Quiz

Computer Architecture Quiz

University

56 Qs

NET1L - Lesson 8 (Network Layer Pt.2)

NET1L - Lesson 8 (Network Layer Pt.2)

University

62 Qs

ATBM đề 1 (app) - 1 (web)

ATBM đề 1 (app) - 1 (web)

University

60 Qs

Data Communication & Networks

Data Communication & Networks

University

60 Qs

kiểm tra tin học phần Word

kiểm tra tin học phần Word

University

57 Qs

Kuiz AOK Pre TAS

Kuiz AOK Pre TAS

University

60 Qs

CompTIA A+ 220-1001 Chapter 17 - 20

CompTIA A+ 220-1001 Chapter 17 - 20

University

59 Qs

CSI104 FE FALL 2023

CSI104 FE FALL 2023

Assessment

Quiz

Computers

University

Medium

Created by

Tony Nguyễn

Used 17+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Different sets of bit patterns have been designed to represent text symbols. Each set is called a___ ?

bit patterns

 binary

C. code

 binary text file

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The queue operation: "queue (queueName)" is used to___

Delete queue

Check status of queue

Create an empty queue

Insert queue

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The device manager will be tracking every device constantly to ensure that the device is___

Ready

Finished

Functioning property

A.  Running

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In ___ cryptography, everyone has access to everyone's public key.

Symmetric-key

Asymmetric-key

Secret-key

Private-key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the system development process, structure charts are tools used in the ___ phase.

Analysis

Design

Implementation

 Testing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___ is a computer program that does perform a legitimate task but which also contains code to carry out malicious attacks such as deleting or corrupting files

DoS

 Trojan horses

Worms

Viruses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the analysis process in the implementation phase that will use a program as an active agent that manipulates active object?

Procedure-oriented analysis

Structured analysis

Classical analysis

A. Object-oriented analysis

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?