CSEC Information Technology June 2024 Paper1 part 2

CSEC Information Technology June 2024 Paper1 part 2

10th Grade

20 Qs

quiz-placeholder

Similar activities

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

Network Devices

Network Devices

9th - 12th Grade

15 Qs

Networking Final Exam

Networking Final Exam

10th Grade

22 Qs

urządzenia sieciowe

urządzenia sieciowe

10th - 12th Grade

21 Qs

Networking

Networking

9th - 11th Grade

21 Qs

Technology

Technology

10th Grade

19 Qs

iGCSE Computer Science: Internet & WWW

iGCSE Computer Science: Internet & WWW

9th - 12th Grade

20 Qs

NETWORK

NETWORK

10th Grade

20 Qs

CSEC Information Technology June 2024 Paper1 part 2

CSEC Information Technology June 2024 Paper1 part 2

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Keith Laban

Used 14+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST efficient file access method to use to authenticate customers when they are logging into their accounts?

Direct

Serial

Random

Sequential

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to use a program stored on a secondary storage device, the program MUST be transferred

Into ROM

Into RAM

Onto a flash drive

Onto an optical disk

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Records on magnetic tape are stored

Directly

Randomly

Sequentially

Indexed-sequentially

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web developer is important to a company because this person

Is responsible for the company’s website

Assigns web addresses to all users in a company

Backs up web files and stores the disks at another location

Monitors the shutting down of competitors’ websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the LEAST reliable instruction for keeping passwords to online accounts secure?

Use only long and strong passwords

Change your passwords on a regular basis

Keep a copy of all passwords on your computer

Create passwords with numbers and special characters

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following examples describe a denial-of-service (DOS) attack?

I. A sudden excessive increase in the number of junk emails

II. Inability to reach regular websites because of too many requests

III. Decrease in network performance because of a flood of transactions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used to ensure that all web pages and servers communicate with each other?

IP

FTP

VoIP

HTTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?