it security basics quiz

DOCX 8 стр. 20,1 КБ Бесплатная загрузка

Предварительный просмотр (5 стр.)

Прокрутите вниз 👇
1 / 8
1, what is protocol? what is ergonomics? what is intruder? what is encryption? what is freeware? choose the best answer. enscrytion ________ data into a secret code so that only someone with a key can read it. choose the best answer. descryption __________enscrypted data back into its original form. choose the best answer. spyware ________ information from your pc without your consent. choose the best answer. a trojan horse is disguised as a useful ______ choose the best answer. originally, all skilled ___________were known as hackers, but during the 1990s. choose the best answer. worms are ___________programs that have the capacity to move from one computer to another choose the best answer. antivirus is a _________________ which detects, removes viruses, and protects the system from further attacks. choose the best answer. ______________ is someone whose job is to plan a piece of work or activity and organize the work of …
2 / 8
oose the best answer. please close the window ___________ you go out. choose the best answer. please turn off the lights _________ you go to bed. choose the best answer. i'm so worried about max. _________ you hear any news, please phone me. choose the best answer. _________ you've read the newspaper, can i have it? choose the best answer. wired means ___________________________ choose the best answer. wireless means _________________________ choose the best answer. meaningless is ___________________. choose the best answer. solution is ___________________ choose the best answer. _________________means to take a number or amount away from another number or amount choose the best answer. ___________ means to split a specific amount into equal parts. choose the best answer. ____________means to bring or combine two or more numbers together to make a new total. choose the best answer. equal is _______________. choose the best answer. a row is ____________. choose …
3 / 8
the word economise. insert the right word to the gap. the common methods of protections are _______ for access control, firewalls, and enscrytion and descryption systems. insert the right word to the gap. _______ (malicious software) are programs designed to infiltrate or damage your computer, for example viruses, worms, trojans and spyware. choose the right synonym to the word beginning choose the right antonym to the word huge. choose the right word. letters, numbers, punctuation marks, etc. ___________ insert the right word to the gap. if you use online banking services, make sure the use _______ - files that are like digital identification cards and that identify users and web servers. insert the right word to the gap. mozilla firefox displays a lock when the website is secure and allows you to disable or delete _______ – small files placed on your hard driver by web servers so that they …
4 / 8
entire hard disk. find the definition: put at risk find the definition: increase find the definition: wildlife answer the question. what is ergonomics? #it is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system. fill in the gap. ict is sometimes used synonymously with ______ (for information technology) fill in the gap. some components, such as computers and telephones, have existed for ______. fill in the gap. ct's ______ to economic development and business growth has been so monumental.( economic ,importance, broad, face to face ) choose the right answer. ________ refers to the transmission of signals over a distance for the purpose of communication. choose the right answer. ________ is a way of transmitting pictures by means of digital signals, in contrast to the analogue signals used by traditional tv. choose the right reported speech. "my brother is buying a car" …
5 / 8
hoose the right preposition. the party is ______ the third floor. choose the right answer. please turn off the lights ______ you go to bed. choose the right preposition. you are standing ____ my foot. choose the right interaction device. a display, a hard disk, monitor, a touchpad choose the right interaction device. a display, a hard disk, a touchscreen, monitor, find the mistake in the sentence. on the 1950s, most computer users worked either in scientific research labs or in large corporations. find the mistake in the sentence. both group quickly learned that writing programs in the machine language of zeros and ones was not practical or reliable. choose the right preposition. the author’s name is ____ the cover of the book. choose the right preposition. there are no prices ____ this menu. choose the right answer. stop at a petrol station _______ we run out of petrol. find …

Хотите читать дальше?

Скачайте все 8 страниц бесплатно через Telegram.

Скачать полный файл

О "it security basics quiz"

1, what is protocol? what is ergonomics? what is intruder? what is encryption? what is freeware? choose the best answer. enscrytion ________ data into a secret code so that only someone with a key can read it. choose the best answer. descryption __________enscrypted data back into its original form. choose the best answer. spyware ________ information from your pc without your consent. choose the best answer. a trojan horse is disguised as a useful ______ choose the best answer. originally, all skilled ___________were known as hackers, but during the 1990s. choose the best answer. worms are ___________programs that have the capacity to move from one computer to another choose the best answer. antivirus is a _________________ which detects, removes viruses, …

Этот файл содержит 8 стр. в формате DOCX (20,1 КБ). Чтобы скачать "it security basics quiz", нажмите кнопку Telegram слева.

Теги: it security basics quiz DOCX 8 стр. Бесплатная загрузка Telegram