Computer Science Quiz

Computer Science Quiz

University

39 Qs

quiz-placeholder

Similar activities

Quiz on Assessment of Teaching Practice

Quiz on Assessment of Teaching Practice

University

35 Qs

Đề 2

Đề 2

University

38 Qs

Pre Test DPK Gasal

Pre Test DPK Gasal

University

40 Qs

INTRODUCTION TO MUSIC

INTRODUCTION TO MUSIC

University

35 Qs

Camera / Video

Camera / Video

University

40 Qs

Environment Protection and Conservation

Environment Protection and Conservation

University

40 Qs

Curriculum Evaluation Quiz

Curriculum Evaluation Quiz

University

38 Qs

Exploring Computational Thinking and AI

Exploring Computational Thinking and AI

10th Grade - University

40 Qs

Computer Science Quiz

Computer Science Quiz

Assessment

Quiz

Education

University

Medium

Created by

Инаят Нургали

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Statistical or machine learning methods applied to web data such as page views, hits, clicks, and conversions, generally with a view to learning what web presentations are most effective in achieving the organizational:

Web analytics

Data mining

Network analytics

Data analysing

Machine learning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only operation unavailable on the internet in e-banking:

getting cash

to transfer money

to pay bills

to have full information about their accounts

to contact with customer service department

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Internet provider is:

set of rules which helps to get information from another address

a peripheral device that is used to communicate with another computer

an organization engaged in the creation of web-sites

a local administration

the organization provider of Internet services

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first global computer network had a name:

Arpanet

Intranet

BITNet

NSFnet

Mailnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Find biometric data which used for execution of users’ identification/authentication:

fears and prejudices

finger prints

leap motion

eye retina and cornea

data typing from keyboard

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of cryptographic algorithms allows preventing the information leakage by:

digital signature

cryptography requirements

data confidentiality support

authentication support

data integrity support

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A face to cloud computing which helps to guard against down time and determines costs:

Applications

Service level agreements

Bandwidth fees

Virtual private networks

Application programming interfaces

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?