Search Header Logo

EOY Study Guide FOC

Authored by Ashleigh Altman

Other

9th - 12th Grade

Used 6+ times

EOY Study Guide FOC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is not connected to the Internet of Things?

An AM/FM radio without any blue tooth or Internet connection capabilities


A wearable device that measures your physical activity and allows you to track your activity through a mobile app


A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what does CIA stand for?

Confidentiality, Integrity, Availability

Central Intelligence Agency


Cybersecurity, Internet, Accessibility

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an output device?


  1. To allow the computer to store information or programs.


  1. To allow the user to give data or information to the computer.


  1. To allow computers to connect and communicate with other computers.


To allow the computer to display or communicate the result of a computation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a network device?


To allow the computer to store information or programs.


To allow the user to give data or information to the computer.


To allow computers to connect and communicate with other computers.


To allow the computer to display or communicate the result of a computation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not true about cybersecurity?


Recent data breaches have released personal information of hundreds of millions of people.


Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is top down design?


Top down design is a way of designing your program by starting with the biggest problem and breaking it down into smaller and smaller pieces that are easier to solve.

Top down design is a way that you can create designs on a computer to put on a web page


Top down design is a way of designing your programs starting with the individual commands first


Top down design is a way to use loops and if statements to decompose the problem

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?


An attempt by a government to deny Internet access to its citizens


An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers


An attempt by one user to deny service to another user by posting malicious material on a social network


An attempt by an Internet user to access private information stored in a private database

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?