Internet 1

Internet 1

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Điện trở, tụ điện, cuộn cảm

Điện trở, tụ điện, cuộn cảm

12th Grade

20 Qs

Latihan bro

Latihan bro

12th Grade - University

20 Qs

Actúa - Informática Nivel Básico

Actúa - Informática Nivel Básico

3rd Grade - Professional Development

21 Qs

Arrays

Arrays

9th - 12th Grade

21 Qs

CDI - Electronic Components & Signals

CDI - Electronic Components & Signals

10th - 12th Grade

27 Qs

ÔN TẬP CN8

ÔN TẬP CN8

8th Grade - University

20 Qs

GLOSARIO DE TERMINOS

GLOSARIO DE TERMINOS

7th - 11th Grade

20 Qs

Evaluación 1: Ofimática

Evaluación 1: Ofimática

1st - 12th Grade

20 Qs

Internet 1

Internet 1

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Easy

Created by

LOUIS TAPIA

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A task takes 20 seconds to complete on a single processor. If the task is split perfectly across 4 processors, assuming no overhead or communication delay, how long would the task take to complete?

2 seconds

5seconds

10 seconds

12 seconds

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a parallel computing task with minimal communication overhead, which of the following generally leads to a faster overall processing time?

Increasing the number of processors

Increasing the amount of communication between processors

Increasing the size of the problem

Increasing the overhead for task coordination

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a phishing attack?

Infecting a computer with a virus that corrupts data.

Sending an email that appears to be from a legitimate source to trick individuals into providing personal information

Installing malware through a downloaded file.

Using encryption to protect data during transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a Trojan horse from other types of malware?

It replicates itself and spreads across systems like a worm.

It encrypts files on the victim’s computer and demands a ransom.

It attacks the system's hardware directly.

It disguises itself as a legitimate program but contains harmful code.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of fault tolerance in a computer system?

To prevent any hardware failures from occurring.

To automatically detect and remove viruses from the system.

To avoid the need for backups.

To ensure a system can continue functioning even when one or more components fail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is commonly used to achieve fault tolerance?

Adding redundant components, such as multiple power supplies or hard drives.

Using faster processors.

Decreasing the load on the system by limiting the number of users.

Implementing software updates regularly.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the internet?

A private network used by organizations.

A type of computer used for data storage.

A network of networks that connects millions of computers globally.

A large software program used by companies.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?