Flareup CSI

Flareup CSI

12th Grade

30 Qs

quiz-placeholder

Similar activities

2.7 System Software

2.7 System Software

12th Grade - University

25 Qs

Angular 4

Angular 4

University

25 Qs

File Organization - Information Processing Part 2

File Organization - Information Processing Part 2

5th - 12th Grade

25 Qs

C++

C++

University

25 Qs

Application Software

Application Software

University

29 Qs

Ethics in Cyberspace

Ethics in Cyberspace

University

25 Qs

Sistemas Operativos

Sistemas Operativos

10th Grade - University

25 Qs

Quiz on Operating System Basics

Quiz on Operating System Basics

University

25 Qs

Flareup CSI

Flareup CSI

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Omkar Sahay

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

A user enters "http://example.com" in their browser's address bar. What protocol is the browser using to retrieve the webpage?

File Transfer Protocol (FTP)
HyperText Transfer Protocol (HTTP)
Secure Socket Layer (SSL)
Domain Name System (DNS)

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

On a webpage you need to preserve multiple consecutive spaces between words but browsers tend to collapse them into a single space. Which HTML entity would you use to ensure these spaces are rendered properly especially for maintaining alignment or specific formatting?

Use regular space
Use <br> tags
Use &nbsp;
Use CSS padding

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

You're managing a website and your users frequently receive emails that look like they're from your company but aren't. What security vulnerability should you be most concerned about?

Phishing
Cross-site scripting
SQL injection
Man-in-the-middle attack

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

You're developing a program that processes user input. Before sending data over a network you want to ensure it’s protected against third-party interception. What should you use to secure the data?

Firewall
Encryption
DNS lookup
Data redundancy

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Your program continuously checks the temperature from a sensor and reacts only when the temperature falls below a certain threshold. What type of loop are you using to implement this behaviour?

For loop
Infinite loop
Do-while loop
While loop

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Why is low power consumption a crucial feature for IoT devices particularly those deployed in remote areas?

It enables faster data transmission
It extends device operational lifespan without maintenance
It improves processing speed
It allows larger data storage on the device

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

You are writing a program that calculates payroll for a company. Before the program can be run on a computer you need to translate the code into something the computer can execute directly. What is this process called?

Parsing
Compiling
Debugging
Linking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?