ICT Quiz

Description

Quiz on ICT Quiz, created by Lana Dowler on 11/12/2018.
Lana Dowler
Quiz by Lana Dowler, updated more than 1 year ago
Lana Dowler
Created by Lana Dowler almost 6 years ago
71
1

Resource summary

Question 1

Question
Having technology embedded into everyday object, such as fridges or cat flaps is an example of what?
Answer
  • Netiquette
  • Online communication
  • Ubiquitous computing
  • Virtual world

Question 2

Question
Another name given to the chosen device that is being used to access the internet.
Answer
  • Backbone
  • Router
  • keyboard
  • Client

Question 3

Question
Cables run special software to serve other computers
Answer
  • True
  • False

Question 4

Question
What type of online service is Auctions and online banking?
Answer
  • Commerce
  • Communication
  • Government
  • Business

Question 5

Question
When using Ubiquitous computing they use [blank_start]RFID[blank_end] chips.
Answer
  • ISP
  • RFID
  • Emoticons
  • Algorithm

Question 6

Question
This images shows a what?
Answer
  • Router
  • Computer
  • Server
  • Backbone

Question 7

Question
Who is able to edit wiki?
Answer
  • The wiki man
  • Members of wiki
  • Google
  • The computer

Question 8

Question
Tick TWO examples of VLE?
Answer
  • Google Classroom
  • BBC Bitesize
  • HWB
  • Wiki
  • Your teacher

Question 9

Question
Fill in the blanks in the correct boxes.
Answer
  • Internet
  • NAP
  • PoP
  • Client
  • Router
  • Backbone

Question 10

Question
Virgin media is a type of ISP.
Answer
  • True
  • False

Question 11

Question
[blank_start]Pay-Per-Click[blank_end] is a type of online advertising. Another type of online advertising is [blank_start]Pop up ads[blank_end]
Answer
  • Pop up ads
  • Online banking
  • Images
  • Pay-Per-Click
  • Paper click
  • Pay- Per-Look
  • Pay-per-view

Question 12

Question
Barry is sending sending an email with several files attached but the MG they use is pat her 25MG limit. Vicky must compress her files with an [blank_start]algorithm[blank_end] to make them smaller. She then produces an [blank_start]index[blank_end] which stores the position of all the words that were cut from the new compressed files.
Answer
  • algorithm
  • index

Question 13

Question
Fill in the boxes...
Answer
  • Protocol
  • Domain
  • Path

Question 14

Question
A [blank_start]point of presence[blank_end] (PoP) is an access point of the [blank_start]internet[blank_end]. An ISP may have several PoPs to allow [blank_start]good[blank_end] access to the internet.
Answer
  • point of presence
  • Place on protocol
  • Point of Protocol
  • internet
  • World Wide Web
  • Client
  • good
  • Poor
  • Cheap
  • slow

Question 15

Question
A Network access point (NAP) is where different networks interconnect, such as...
Answer
  • A client and a person
  • Your home network onto the internet
  • BT Network meets Virgin Medias Network
  • A Backbone and a Point of presence

Question 16

Question
An advantage of dial up is that even if you have an old technology the reception is good.
Answer
  • True
  • False

Question 17

Question
Drag the right descriptions to the right square.
Answer
  • checks the packets have been reassembled
  • where the data had come from
  • identifies the packets and reassembles

Question 18

Question
[blank_start]Protocols[blank_end] are rules that allow computer systems to connect with different systems to transfer data.
Answer
  • Protocols

Question 19

Question
The World Wide Web is an example of a sponsored link.
Answer
  • True
  • False

Question 20

Question
HTTP ([blank_start]Hyper[blank_end] Text [blank_start]Transfer[blank_end] Protocol)
Answer
  • Hyper
  • Hyperlink
  • Html
  • Transfer
  • Text
  • Technology
  • Television

Question 21

Question
Microwaves use short waves lengths to transfer data to things.
Answer
  • True
  • False

Question 22

Question
STP is the cable used mostly in schools.
Answer
  • True
  • False

Question 23

Question
Client side : The web page is being processed [blank_start]whilst you are using it.[blank_end]
Answer
  • whilst you are using it.
  • after being sent back to the server.
  • before the client used it.

Question 24

Question
Tick TWO different threats to data
Answer
  • Virus
  • Personal privacy settings
  • Encryption
  • Malware

Question 25

Question
Which technology monitors your movement
Answer
  • Airport passenger list
  • web sites visited
  • emails

Question 26

Question
The freedom of information act protects rights of the makers of software, photos, music, films etc.
Answer
  • True
  • False

Question 27

Question
A protection method of hackers is: [blank_start]Encryption[blank_end]
Answer
  • Encryption
  • Personal data security
  • Backup/ Download

Question 28

Question
Tick one that is a way of protecting data
Answer
  • Access levels
  • Phishing
  • Accidental damage
  • Virus
Show full summary Hide full summary

Similar

Unit 1 Sociology: Family Types
ArcticCourtney
Romeo and Juliet essay
Tambo234
The Wife of Bath Critics
rlshindmarsh
Command or Process Words for Essay Writing
Bekki
A Christmas Carol Quotes
0serenityrose0
GCSE AQA Chemistry Atomic Structure and Bonding
Joseph Tedds
THE PRESENT CONTINUOUS
neworld2030
atoms and elements
Danoa400
The Great Gatsby - Aspects of Narrative
Sophie Beckingham
Science Flash Cards
Em Roberts
Regular and Irregular Verbs - Preterite Tense
Tomja07