What I Learned in IT, Part 1
Quiz by Joni Bachelor
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
36 questions
Show answers
- Q1Security experts use the term _ to refer to any method that confirms a person's identity using something that the person knows, possesses, or is, such as a type of athlete job title.Authenticaton ProtocolKeyloggerDispatch VerificationPhishing30s
- Q2A _____ is a series of characters that verifies a user ID. It confirms that you are the person you claim to be.Mouse GuardUser NameSystem CodePassword30s
- Q3____ is a way of attempting to acquire personal information such as usernames, passwords, account numbers, and credit card numbers by masquerading as a trustworthy entity in an electronic communication, such as email.Brute ForceSniffingPhishingKey Logging30s
- Q4Which legal reformation changed how insurance is regulatedADAHIPAAPCISOX30s
- Q5A _____ usually connects computers in a single building via data cables.Local Area Network (LAN)Personal Area Network (PAN)Residential Area Network (RAN)Wide Area Network (WAN)30s
- Q6Bus, Star, Ring, Mesh, and Tree are examples of ___________.Database OrderDaisy ChainPhysical topologyChain Reaction30s
- Q7Webpages that have a _______ domain are generally considered to be the most reliable for gathering information..net.org.edu.com30s
- Q8What is binary number for 311100110111101011111130s
- Q9What protocol is used to upload data to an internet server?IEEEHTTPVolPFTP30s
- Q10A user interface where the user interacts with the computer via text prompts is call a _______ interface.Command LineGraphical userGraphical LineWindows30s
- Q11Which of the following is NOT an advantage of mobile computing?Quality of connectivityCould computingPortabilityIncreased productivity30s
- Q12Which of the following is NOT an advantage of public cloud computing?Public cloud infrastructure provides lower costsPublic could is easier to set up for smaller businessPublic cloud is more securePublic cloud infrastructure is larger in scale30s
- Q13When compared to proprietary systems, which of the following is NOT an advantage of open source systems?ModifiableCompatibility with application programsCostsLicensing concerns30s
- Q14Which statement is NOT true about updating a computer operating system?It helps to prevent your computer from attacksThere is usually a cost associated with updating your OSIt provides fixes for issues that weren't found before the OS was originally releasedAdministrative privileges are usually required30s
- Q15In computing, being able to install a hardware component without needing to manually configure it with the operating system is called _________.Rapid DeploymentPlug and PlayHardware GeneralizationDevice Deployment30s