QUIZ DECEMBER 2022
Sign in to Google to save your progress. Learn more
Email *
Which of the following is NOT one of the criteria for evaluating a website’s content? *
1 point
What is the device that connects several devices in a network together and forward the data received to one or more directions?
*
1 point
Choose the CORRECT answer:
*
1 point
Captionless Image
Determine the CORRECT match of broadband internet service and its type
*
2 points
What is the correct description for the type of architecture shown in the picture?
*
2 points
Captionless Image
Bluebugging occurs when cyber thieves exploit Bluetooth devices that have been paired. Security experts recommend following these practices to prevent bluebugging, EXCEPT
*
2 points
In order to save money and space, a company wishes to study cloud computing services. It aims to offer a
shared workspace with software, security options, and computing resources without the need for them all to be
installed on users' devices. As an IT consultant, which of the following desktops would you suggest to fit this
goal?
*
2 points
Before shutting down, the computer copies the contents of its RAM to a hard disk or other non-volatile storage.
This statement refers to
*
1 point
"One of the operating systems that provides open-source software enables users to use, modify, and redistribute data." This statement refers to
*
1 point
In order to manage daily business transactions, a user needs specific software. This statement refers to
*
1 point
When can a computer application be utilized once it has been installed?
*
1 point
Which of the following statements regarding phishing filters is accurate?

i. A website application that restricts access to safeguard users.
ii. An application that protects users from phoney websites.
iii. A tool that safeguards users from legitimate websites.
iv. A tool that guard user from fraudulent websites
*
2 points
Which of the following happens when a computer or mobile device runs out of RAM?
*
2 points
Which of the following is the correct sequence of operating system interactions with a user, an application, and hardware?

i. The user instructs the operating system to run an application.
ii. An operating system user interface is displayed on the screen when a user turns on a computer.
iii. The operating system sends the instruction to the hardware
iv. The application sends the instruction to the computer’s operating system (software).
*
2 points
If a computer is affected by botnets, it will
*
2 points
Which of the following statements is INCORRECT?
*
1 point
Which of the following statement is TRUE about communications software?
*
1 point
Which of the following best describes e-commerce?
*
1 point
Determine the CORRECT match of the broadband internet services and its’ type.
*
2 points
The following is a guideline to use public Wi-Fi Hot Spot safely EXCEPT
*
2 points
Which of the following is the weakness of Bluetooth technology?
*
2 points
Which of the following methods can be used to identify unauthorised users of a wireless home network?
*
2 points
The access time of memory such as SRAM or DRAM is faster compare to storage devices such as SSD or hard
drive.
*
1 point
Laptop usually use a single chip that contains all functions of the motherboard.
*
1 point
The major three advantages of software suite are ease of use, integration, and lower cost.
*
1 point
The Children’s Online Privacy Protection Act requires companies to verify a surfer’s age before displaying materials harmful to minors.
*
1 point
Only medium to big organizations can afford to invest in the T-carrier line as it provides a very fast data transfer rate and is expensive.
*
1 point
A text-based name that correlates to the IP address of a server, such as a web server that hosts a website, is
known as an IP address.
*
1 point
Submit
Clear form
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy