NAME

Question Types


Start With


Question Limit

of 47 available terms

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. Software theft
  2. Report generator
  3. Information Theft
  4. Malware
  5. Database
  1. a • Computers viruses, worms, Trojan Horses, and rootkits are classified as Malware
  2. b Computer security that occurs when someone steals personal or confidential information
  3. c • Software theft occurs when someone steals software media or causes harm
  4. d DBMS feature that allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.
  5. e • A database is a collection of data organized in a manner that allows access, retrieval, and use of that data

5 Multiple Choice Questions

  1. • Intellectual property rights are the rights to which creators are entitled for their work
  2. A single copper wire surrounded by at least three layers : an insulating material, a woven or braided metal, and a plastic outer coating
  3. • Wi-Fi is the term used to describe 802.11 protocol
  4. • A UPS connects between a computer and a power source
  5. • Booting is the process of starting or restarting a computer

5 True/False Questions

  1. LINUX AND UbuntuThe amount of data, instructions, and information that can travel over a communication channel.

          

  2. BIOS• The BIOS executes a series of tests, collectively known as the POST

          

  3. Twisted copper wire...

          

  4. Screen Saver• A GPS receiver is used to receive satellite signals and contains an antenna and processor

          

  5. VPN (Virtual Private Network)Network that provides a mobile connection to a company network server, as if the user has a private line.

          

Create Set