Random

Random

2nd Grade

7 Qs

quiz-placeholder

Similar activities

Berpikir Komputasi - IPO

Berpikir Komputasi - IPO

2nd Grade

10 Qs

SOAL  JARINGAN KOMPUTER KELAS 9

SOAL JARINGAN KOMPUTER KELAS 9

2nd Grade

10 Qs

Microsoft Excel 2

Microsoft Excel 2

1st - 5th Grade

10 Qs

Final Quiz eng

Final Quiz eng

1st - 5th Grade

11 Qs

Asesmen Formatif – Sistem Bilangan

Asesmen Formatif – Sistem Bilangan

1st - 5th Grade

4 Qs

Simbol Carta Alir

Simbol Carta Alir

1st Grade - University

5 Qs

PACKAGING AND LABELING OF FOOD PRODUCTS

PACKAGING AND LABELING OF FOOD PRODUCTS

2nd Grade

5 Qs

25-26 S2 Quizizz (第1學期)

25-26 S2 Quizizz (第1學期)

2nd Grade

10 Qs

Random

Random

Assessment

Quiz

Information Technology (IT)

2nd Grade

Practice Problem

Hard

Created by

User Friendly

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Backups are stored at a different physical location from the primary data

On-site Storage

Off-site Storage

Cloud Storage

Hybrid Storage Solutions

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Portable storage devices connected via USB or other interfaces, used for local

backups.

Tape Drives

External Hard drives

Network Attached Storage (NAS)

Flash Drives

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A process where the entire system, including the operating system, applications,

and data, is restored from a backup to its state at the time of the backup.

Full System Back up

File Level Back up

Database Back up

Application Backup

4.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

Which of the following is an example of a composite attribute?

Employee ID

Name (First Name, Last Name)

Date of Birth

Phone Number

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It refers to the process of creating copies of data from a database at specific intervals

Back up

Recovery

Incremental

Differential

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Risks posed by individuals within the organization who have authorized access

SQL Injection

Malware

Insider Threats

Data Breaches

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is NOT a problem caused by unnormalized data?

Relation anomaly

Insertion anomaly

Update anomaly

Deletion anomaly