scsu 50 - 100

scsu 50 - 100

12th Grade

50 Qs

quiz-placeholder

Similar activities

Intro to Computing Midterms

Intro to Computing Midterms

12th Grade

50 Qs

UH ORIENTASI DASAR TEKNIK JARINGAN KOMPUTER DAN TELEKOMUNIKASI

UH ORIENTASI DASAR TEKNIK JARINGAN KOMPUTER DAN TELEKOMUNIKASI

10th Grade - University

50 Qs

Latihan ASAS GASAL 2425

Latihan ASAS GASAL 2425

9th - 12th Grade

52 Qs

WARNA DAN TIPOGRAFI DESAIN GRAFIS

WARNA DAN TIPOGRAFI DESAIN GRAFIS

1st Grade - University

50 Qs

STARTER - 1D Array Test

STARTER - 1D Array Test

9th - 12th Grade

48 Qs

Quiz sobre Diseño Gráfico y Tipos de Archivos de Imagen

Quiz sobre Diseño Gráfico y Tipos de Archivos de Imagen

10th Grade - University

45 Qs

BAI ON KHOI 5

BAI ON KHOI 5

1st Grade - University

46 Qs

ULANGAN HARIAN TEKNIK PENGOLAHAN AUDIO DAN VIDEO

ULANGAN HARIAN TEKNIK PENGOLAHAN AUDIO DAN VIDEO

1st - 12th Grade

50 Qs

scsu 50 - 100

scsu 50 - 100

Assessment

Quiz

Computers

12th Grade

Easy

Created by

saksham verma

Used 60+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Safari is a web browser based on the _______ engine.

A) WebKit

B) NetFront

C) MARTHA

D) Gecko

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer networking, what does DMZ stands for?

A) Demilitarised Zone

B) Dead Man's Zone

C) Decentralized Machine Zone

D) Digital Media Zone

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is URL Spoofing?

A) The process of creating a URL

B) The act of misleading a user to a different website by sending a legitimate-looking URL

C) Downloading proxy servers

D) Securing IP address

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The method of adding geographical metadata to various media such as images, videos, websites, SMS messages, QR codes, or smartphone transmissions is known as:

A) Geometric

B) Geotagging

C) Geostrategy

D) Geopolitics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data security is also called:

A) Information Protection (IP)

B) Information Security (IS)

C) Data Encryption (DE)

D) Data Breach Management (DBM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Clickjacking?

A) The practice of writing malicious code or program that attackers develop to harm or damage users' security

B) The practice of convincing people to reveal confidential information about themselves, friends, relatives, or colleagues

C) The attempt to hide malicious programs in the garb of legitimate buttons or links

D) All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an additional layer of security to your LinkedIn account?

A) Two-step verification

B) Three-step verification

C) Three-step authentication

D) Single-click strategy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers