Random

Random

2nd Grade

7 Qs

quiz-placeholder

Similar activities

Dasar TLJ

Dasar TLJ

1st - 5th Grade

10 Qs

Avvalgi mavzuni takrorlash testi

Avvalgi mavzuni takrorlash testi

1st - 5th Grade

6 Qs

Aspek Hukum dan Dampak Sosial Informatika

Aspek Hukum dan Dampak Sosial Informatika

1st Grade - University

10 Qs

Dasar Koding dan Kecerdasan Artifisial

Dasar Koding dan Kecerdasan Artifisial

2nd Grade

10 Qs

Uji Pengetahuan Jaringan Komputer

Uji Pengetahuan Jaringan Komputer

2nd Grade

10 Qs

Quiz sobre Comandos DML SQL

Quiz sobre Comandos DML SQL

2nd Grade

10 Qs

Recuperação - Bancos de Dados - DDL

Recuperação - Bancos de Dados - DDL

2nd Grade

10 Qs

G4-5 AI with SCRATCH Session 3

G4-5 AI with SCRATCH Session 3

1st - 5th Grade

5 Qs

Random

Random

Assessment

Quiz

Information Technology (IT)

2nd Grade

Hard

Created by

User Friendly

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Backups are stored at a different physical location from the primary data

On-site Storage

Off-site Storage

Cloud Storage

Hybrid Storage Solutions

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Portable storage devices connected via USB or other interfaces, used for local

backups.

Tape Drives

External Hard drives

Network Attached Storage (NAS)

Flash Drives

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A process where the entire system, including the operating system, applications,

and data, is restored from a backup to its state at the time of the backup.

Full System Back up

File Level Back up

Database Back up

Application Backup

4.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

Which of the following is an example of a composite attribute?

Employee ID

Name (First Name, Last Name)

Date of Birth

Phone Number

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It refers to the process of creating copies of data from a database at specific intervals

Back up

Recovery

Incremental

Differential

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Risks posed by individuals within the organization who have authorized access

SQL Injection

Malware

Insider Threats

Data Breaches

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is NOT a problem caused by unnormalized data?

Relation anomaly

Insertion anomaly

Update anomaly

Deletion anomaly