NAME

Question types


Start with


Question limit

of 90 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. An example of a vector graphics software application is _____.
  2. All of the following are examples of graphic file formats EXCEPT for _____.
  3. Information security is implemented at the individual machine level, the computer network level, and the _____ level.
  4. A company called _____ provides digital certifications for Web transactions.
  5. A _____ is used as a security device to help identify a worker logging into a business computer system.
  1. a VeriSign
  2. b PowerPoint
  3. c token
  4. d Internet
  5. e .xls
    (.tif, .jpg, .gif)

5 Multiple choice questions

  1. all of the above
    (smart phones, video game consoles, CD players)
  2. pixels
  3. Radio spectrum
  4. 33
  5. SSL connection

5 True/False questions

  1. All of the following are examples of malware EXCEPT for _____.updates

          

  2. A(n) _____ signal is designed to represent computer data in an on or off state.digital

          

  3. Items such as credit cards are beginning to take advantage of RFID technology through the use of a(n) _____ reader.Flash

          

  4. How a cell phone looks, feels, and works is determined by its _____.form factor

          

  5. Businesses prefer to use technology known as _____ to create an exact copy of their files for backup.theft

          

Create Set