CS 3.02 Study Guide

CS 3.02 Study Guide

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Ereditarietà-polimorfismo

Ereditarietà-polimorfismo

11th Grade

25 Qs

Inside Google Quiz

Inside Google Quiz

9th - 12th Grade

25 Qs

LATIHAN PENGENALAN KOMPUTER

LATIHAN PENGENALAN KOMPUTER

10th Grade - University

25 Qs

latihan soal informatika SMALSA

latihan soal informatika SMALSA

10th Grade

25 Qs

4QICT12 - Current and Future Trends of Media and Information

4QICT12 - Current and Future Trends of Media and Information

11th - 12th Grade

28 Qs

Work From Home

Work From Home

12th Grade

25 Qs

CompTIA 220-902 Practice PM TEC

CompTIA 220-902 Practice PM TEC

11th - 12th Grade

26 Qs

Parts of Computer

Parts of Computer

11th Grade

25 Qs

CS 3.02 Study Guide

CS 3.02 Study Guide

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Billy Brewer

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a method to protect a computer from viruses?

Add an antivirus application to the computer

Download software from file sharing torrents

Never run computer updates

Open all e-mails in the inbox

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lakeyla works for a company whose partners require access to files on her computer. Why should she use an extranet?

An extranet provides controlled access to the network

An extranet provides uncontrolled access to the network

An extranet provides access of social networking to the partner

An extranet provides partners access to company financial records

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which might limit Internet connectivity?

De-encapsulation

Extranet

Internet traffic congestion

T-1 line

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which role creates user accounts on the network?

Application Role

Network User

System Administrator

User Role

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

John’s computer was infected by software that attached itself to his computer and began destroying program data. What type of issue did John have?

Botnet

Trojan Horse

Virus

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gerald’s company can only transmit data using a modem. Which connection would his company use?

Wireless

Dial-Up

Fiber-Optic

T-1 Line

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After the Target customer account information was stolen from Target store transactions, Matilda found that someone else had obtained a credit card using Matilda’s personal information. This is an example of what?

Botnet Attack

Denial-of-Service Attack

Identity Fraud

Malware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?