Search Header Logo

Revision Quiz 2

Authored by Marvin Burke

Information Technology (IT)

9th - 12th Grade

Used 1+ times

Revision Quiz 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Customers log in to an online application using a username and password to submit a record of their monthly meter reading to a utility company. Which file organization method is used for the file of all the records submitted by customers each month?

Serial

Random

Sequential

Index-sequential

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Customers log in to an online application using a username and password to submit a record of their monthly meter reading to a utility company. Usernames and encrypted passwords are used to authenticate customers when logging into their accounts. Which of the following is the MOST efficient file access method?

Direct

Serial

Two step verification

Sequential

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In order to use a program stored on a flash drive, the program must be transferred into

ROM

RAM

PROM

EPROM

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a hardware component of a computer system?

Data file

Main memory

Peripheral device

Central processing unit

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A system that analyses data and that uses rules and previous information to deliver possible decisions is called

a robot machine

an expert system

a biometric machine

a mainframe computer

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following statements about biometric systems is INCORRECT?

The level of accuracy is very high.

The personal data captured is very intrusive.

A small amount of memory is used to store data.

The user has to be present to use the system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following examples describe a denial-of-service (DOS) attack?

I. Sudden excessive increase in amount of junk emails

II. Inability to reach regular websites because of too many requests

III. Decrease in network performance because of a flood of transactions

I and II only

I and III only

II and III only

I, II and III

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?