Internet 1

Internet 1

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Teknologi Informasi & Komunikasi

Teknologi Informasi & Komunikasi

7th - 9th Grade

20 Qs

A2-T15-Virtual Machine

A2-T15-Virtual Machine

10th - 12th Grade

20 Qs

E-TECH-quiz1

E-TECH-quiz1

11th Grade

25 Qs

Code Unit 2 The Internet 2020-21

Code Unit 2 The Internet 2020-21

9th - 12th Grade

20 Qs

Chapter 6 Review

Chapter 6 Review

9th - 12th Grade

20 Qs

computer organization fundamentals

computer organization fundamentals

9th - 10th Grade

20 Qs

Primary 2 Computing Term 2 Assessment

Primary 2 Computing Term 2 Assessment

1st Grade - University

22 Qs

Teknologi Jaringan Berbasis Luas (WAN)

Teknologi Jaringan Berbasis Luas (WAN)

11th Grade

20 Qs

Internet 1

Internet 1

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Easy

Created by

LOUIS TAPIA

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A task takes 20 seconds to complete on a single processor. If the task is split perfectly across 4 processors, assuming no overhead or communication delay, how long would the task take to complete?

2 seconds

5seconds

10 seconds

12 seconds

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a parallel computing task with minimal communication overhead, which of the following generally leads to a faster overall processing time?

Increasing the number of processors

Increasing the amount of communication between processors

Increasing the size of the problem

Increasing the overhead for task coordination

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a phishing attack?

Infecting a computer with a virus that corrupts data.

Sending an email that appears to be from a legitimate source to trick individuals into providing personal information

Installing malware through a downloaded file.

Using encryption to protect data during transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a Trojan horse from other types of malware?

It replicates itself and spreads across systems like a worm.

It encrypts files on the victim’s computer and demands a ransom.

It attacks the system's hardware directly.

It disguises itself as a legitimate program but contains harmful code.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of fault tolerance in a computer system?

To prevent any hardware failures from occurring.

To automatically detect and remove viruses from the system.

To avoid the need for backups.

To ensure a system can continue functioning even when one or more components fail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is commonly used to achieve fault tolerance?

Adding redundant components, such as multiple power supplies or hard drives.

Using faster processors.

Decreasing the load on the system by limiting the number of users.

Implementing software updates regularly.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the internet?

A private network used by organizations.

A type of computer used for data storage.

A network of networks that connects millions of computers globally.

A large software program used by companies.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?