CSEC Information Technology June 2024 Paper1 part 2

CSEC Information Technology June 2024 Paper1 part 2

10th Grade

20 Qs

quiz-placeholder

Similar activities

Algorithms

Algorithms

10th - 11th Grade

20 Qs

1.3.1 Networks #1 LAN's, Client-Server, Peer to Peer

1.3.1 Networks #1 LAN's, Client-Server, Peer to Peer

9th - 11th Grade

15 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

Advantages and Disadvantages of Collecting Data

Advantages and Disadvantages of Collecting Data

10th Grade

20 Qs

Základní části počítače a ergonomie

Základní části počítače a ergonomie

9th - 10th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

TIN 9 BÀI 1,2

TIN 9 BÀI 1,2

1st - 12th Grade

15 Qs

Excel

Excel

10th - 12th Grade

15 Qs

CSEC Information Technology June 2024 Paper1 part 2

CSEC Information Technology June 2024 Paper1 part 2

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Keith Laban

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST efficient file access method to use to authenticate customers when they are logging into their accounts?

Direct

Serial

Random

Sequential

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to use a program stored on a secondary storage device, the program MUST be transferred

Into ROM

Into RAM

Onto a flash drive

Onto an optical disk

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Records on magnetic tape are stored

Directly

Randomly

Sequentially

Indexed-sequentially

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web developer is important to a company because this person

Is responsible for the company’s website

Assigns web addresses to all users in a company

Backs up web files and stores the disks at another location

Monitors the shutting down of competitors’ websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the LEAST reliable instruction for keeping passwords to online accounts secure?

Use only long and strong passwords

Change your passwords on a regular basis

Keep a copy of all passwords on your computer

Create passwords with numbers and special characters

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following examples describe a denial-of-service (DOS) attack?

I. A sudden excessive increase in the number of junk emails

II. Inability to reach regular websites because of too many requests

III. Decrease in network performance because of a flood of transactions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used to ensure that all web pages and servers communicate with each other?

IP

FTP

VoIP

HTTP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?