Tech+ Pre-Assessment

Tech+ Pre-Assessment

9th Grade

35 Qs

quiz-placeholder

Similar activities

Economics: Chapters 4 & 5 Review

Economics: Chapters 4 & 5 Review

KG - University

40 Qs

Establishing a business

Establishing a business

9th - 10th Grade

39 Qs

Personal Law FINAL 2025

Personal Law FINAL 2025

9th - 12th Grade

30 Qs

Forensics Hair Analysis

Forensics Hair Analysis

9th - 12th Grade

35 Qs

ESB Domain 2

ESB Domain 2

9th - 12th Grade

33 Qs

Cam Newton

Cam Newton

KG - University

40 Qs

Judicial Branch

Judicial Branch

6th - 12th Grade

30 Qs

PBF Exam Review 2

PBF Exam Review 2

9th - 12th Grade

30 Qs

Tech+ Pre-Assessment

Tech+ Pre-Assessment

Assessment

Quiz

Other

9th Grade

Hard

Created by

Pedro Saenz

Used 4+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Denial-of-service
Data Redundancy
Power Outage
Wiretapping

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Forward the email to a friend and ask for advice.
Reply to the sender and ask if the attachment is safe.
Delete the email without opening the attachment.
Open the attachment because he has anti-virus software installed.

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Your friend Charles has confirmed that someone has been using his password to log in to his social media account. He believes that two bank accounts may also have been compromised. Which of the following password best practices has Andrew MOST likely violated?
Password length
Password age
Password reuse
Multi-factor authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which kind of online attack involves pretending to be a legitimate company to get sensitive information?
Dumpster Diving
Virus
Spyware
Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following encoding schemes would MOST likely be used to represent an emoji?
Unicode
ASCII
Binary
Hexadecimal

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

As a software developer, you need to create a variable to street addresses. Which data type would you MOST likely use?
Float
String
Integer
Boolean

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following lists the basic computing and processing steps in order?
Input, processing, output, and storage
Input, retrieval, processing, and storage
Input/output, processing, and storage
Input, retrieval, output, and storage

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?