placeholder image to represent content

What I Learned in IT, Part 1

Quiz by Joni Bachelor

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
36 questions
Show answers
  • Q1
    Security experts use the term _ to refer to any method that confirms a person's identity using something that the person knows, possesses, or is, such as a type of athlete job title.
    Authenticaton Protocol
    Keylogger
    Dispatch Verification
    Phishing
    30s
  • Q2
    A _____ is a series of characters that verifies a user ID. It confirms that you are the person you claim to be.
    Mouse Guard
    User Name
    System Code
    Password
    30s
  • Q3
    ____ is a way of attempting to acquire personal information such as usernames, passwords, account numbers, and credit card numbers by masquerading as a trustworthy entity in an electronic communication, such as email.
    Brute Force
    Sniffing
    Phishing
    Key Logging
    30s
  • Q4
    Which legal reformation changed how insurance is regulated
    ADA
    HIPAA
    PCI
    SOX
    30s
  • Q5
    A _____ usually connects computers in a single building via data cables.
    Local Area Network (LAN)
    Personal Area Network (PAN)
    Residential Area Network (RAN)
    Wide Area Network (WAN)
    30s
  • Q6
    Bus, Star, Ring, Mesh, and Tree are examples of ___________.
    Database Order
    Daisy Chain
    Physical topology
    Chain Reaction
    30s
  • Q7
    Webpages that have a _______ domain are generally considered to be the most reliable for gathering information.
    .net
    .org
    .edu
    .com
    30s
  • Q8
    What is binary number for 31
    11001
    10111
    10101
    11111
    30s
  • Q9
    What protocol is used to upload data to an internet server?
    IEEE
    HTTP
    VolP
    FTP
    30s
  • Q10
    A user interface where the user interacts with the computer via text prompts is call a _______ interface.
    Command Line
    Graphical user
    Graphical Line
    Windows
    30s
  • Q11
    Which of the following is NOT an advantage of mobile computing?
    Quality of connectivity
    Could computing
    Portability
    Increased productivity
    30s
  • Q12
    Which of the following is NOT an advantage of public cloud computing?
    Public cloud infrastructure provides lower costs
    Public could is easier to set up for smaller business
    Public cloud is more secure
    Public cloud infrastructure is larger in scale
    30s
  • Q13
    When compared to proprietary systems, which of the following is NOT an advantage of open source systems?
    Modifiable
    Compatibility with application programs
    Costs
    Licensing concerns
    30s
  • Q14
    Which statement is NOT true about updating a computer operating system?
    It helps to prevent your computer from attacks
    There is usually a cost associated with updating your OS
    It provides fixes for issues that weren't found before the OS was originally released
    Administrative privileges are usually required
    30s
  • Q15
    In computing, being able to install a hardware component without needing to manually configure it with the operating system is called _________.
    Rapid Deployment
    Plug and Play
    Hardware Generalization
    Device Deployment
    30s

Teachers give this quiz to your class