Computer Science Quiz

Computer Science Quiz

University

39 Qs

quiz-placeholder

Similar activities

Leading Management Organization Preschool

Leading Management Organization Preschool

University

40 Qs

Computer Ethics and Safety Quiz

Computer Ethics and Safety Quiz

University

40 Qs

ValEd Midterm Exam2022

ValEd Midterm Exam2022

University

35 Qs

икт 121-160

икт 121-160

University

40 Qs

Digital Communication Draft Quiz

Digital Communication Draft Quiz

University

41 Qs

WCN

WCN

University

40 Qs

Quiz US Informatika 2025

Quiz US Informatika 2025

12th Grade - University

43 Qs

Professional Issues - Long Quiz

Professional Issues - Long Quiz

University

40 Qs

Computer Science Quiz

Computer Science Quiz

Assessment

Quiz

Education

University

Medium

Created by

Инаят Нургали

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Statistical or machine learning methods applied to web data such as page views, hits, clicks, and conversions, generally with a view to learning what web presentations are most effective in achieving the organizational:

Web analytics

Data mining

Network analytics

Data analysing

Machine learning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only operation unavailable on the internet in e-banking:

getting cash

to transfer money

to pay bills

to have full information about their accounts

to contact with customer service department

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Internet provider is:

set of rules which helps to get information from another address

a peripheral device that is used to communicate with another computer

an organization engaged in the creation of web-sites

a local administration

the organization provider of Internet services

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first global computer network had a name:

Arpanet

Intranet

BITNet

NSFnet

Mailnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Find biometric data which used for execution of users’ identification/authentication:

fears and prejudices

finger prints

leap motion

eye retina and cornea

data typing from keyboard

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of cryptographic algorithms allows preventing the information leakage by:

digital signature

cryptography requirements

data confidentiality support

authentication support

data integrity support

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A face to cloud computing which helps to guard against down time and determines costs:

Applications

Service level agreements

Bandwidth fees

Virtual private networks

Application programming interfaces

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?