Internet 1

Internet 1

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Overview of computer

Overview of computer

10th - 11th Grade

20 Qs

Intro to CyberSecurity - Intro to Networking

Intro to CyberSecurity - Intro to Networking

9th - 12th Grade

25 Qs

CompTIA A+ Acronyms Quiz

CompTIA A+ Acronyms Quiz

12th Grade

20 Qs

ICT

ICT

5th - 10th Grade

23 Qs

CPA Prelims JY 2022

CPA Prelims JY 2022

8th Grade - Professional Development

20 Qs

Administrasi Infrastruktur Jaringan

Administrasi Infrastruktur Jaringan

11th Grade

20 Qs

Information System

Information System

9th Grade

30 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Internet 1

Internet 1

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Easy

Created by

LOUIS TAPIA

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A task takes 20 seconds to complete on a single processor. If the task is split perfectly across 4 processors, assuming no overhead or communication delay, how long would the task take to complete?

2 seconds

5seconds

10 seconds

12 seconds

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a parallel computing task with minimal communication overhead, which of the following generally leads to a faster overall processing time?

Increasing the number of processors

Increasing the amount of communication between processors

Increasing the size of the problem

Increasing the overhead for task coordination

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a phishing attack?

Infecting a computer with a virus that corrupts data.

Sending an email that appears to be from a legitimate source to trick individuals into providing personal information

Installing malware through a downloaded file.

Using encryption to protect data during transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a Trojan horse from other types of malware?

It replicates itself and spreads across systems like a worm.

It encrypts files on the victim’s computer and demands a ransom.

It attacks the system's hardware directly.

It disguises itself as a legitimate program but contains harmful code.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of fault tolerance in a computer system?

To prevent any hardware failures from occurring.

To automatically detect and remove viruses from the system.

To avoid the need for backups.

To ensure a system can continue functioning even when one or more components fail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is commonly used to achieve fault tolerance?

Adding redundant components, such as multiple power supplies or hard drives.

Using faster processors.

Decreasing the load on the system by limiting the number of users.

Implementing software updates regularly.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the internet?

A private network used by organizations.

A type of computer used for data storage.

A network of networks that connects millions of computers globally.

A large software program used by companies.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?