Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

M1-Q3
Due
Dec 11 at 11:59pm
Points
25
Questions
25
Available
after Dec 9 at 12am
Time Limit
30 Minutes
Allowed Attempts
2

Instructions
Time limit for 30 minutes.

Take the Quiz Again

Attempt History
Attempt Time Score
LATEST Attempt 1
16 minutes 21 out of 25

Score for this attempt:


21 out of 25
Submitted Dec 10 at 1:21pm
This attempt took 16 minutes.

Question 1 1
/ 1 pts

An ____ address is a 128-bit address that is displayed in the hexadecimal


format and not in the dotted-decimal notation.

 
Class A

 
Class B

Correct!  
IPv6

 
IPv4

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 1/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

Question 2 0
/ 1 pts

identifies the physical location Of intermediary devices, configured port,


and Cable installation.

 
Network Layout

 
Network Wiring

orrect Answer  
Physical Topology

ou Answered  
Logical Topology

Question 3 1
/ 1 pts

__________ is any program that monitors your online activities or installs


programs without your consent for profit or to capture personal
information.

 
Adware

 
Trojan

 
Phishing

Correct!  
spyware

Question 4 1
/ 1 pts

Which of the following statements is false?

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 2/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

 
A DDoS attack is a cyber attack to interrupt normal traffic of a targeted
website, service, server, or network.

Correct!  
Denial of service is type of cyber attacks, which main aim is to steal
sensitive information

 
The main target of DoS attack is loss of reputation of an organization.

 
In DoS attack, the malicious data or requests are sent from a specific
source but in the DDoS attack, the malicious requests are sent from
multiple systems or sources to disrupt the services.

Question 5 1
/ 1 pts

The_________________ is a massive network of networks.

 
IP

Correct!  
Internet

 
Static

 
Dynamic

Question 6 1
/ 1 pts

Which of the following statements is false?

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 3/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

Correct!  
None of the above.

 
a website is what people see and interact with when they get there.

 
a URL is how to find a website

 
A domain is the name of a website

Question 7 1
/ 1 pts

It is meant to enable the user to carry out some specific set of tasks or
functions.

 
System Software

 
Utility Program

 
Custom Software

Correct!  
Application Software

Question 8 1
/ 1 pts

Phishing is what type of attack?

 
Malicious Attack

 
Protocol Attack

Correct!  
Social Engineering

 
Network Attack

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 4/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

Question 9 1
/ 1 pts

It is software that automatically displays or downloads advertising material


(often unwanted) when a user is online.

Correct!  
Adware

 
Social Engineering

 
Ransomware

 
spyware

Question 10 1
/ 1 pts

it is an identifying number that is associated with a specific computer or


computer network. 

 
HTTPS

 
URL

Correct!  
IP address

 
HTTP

Question 11 1
/ 1 pts

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 5/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

A ___________ attack is a malicious attack where legitimate users are


unable to access the computer systems, services, or network resources.

Correct!  
denial-of-service (DoS)

 
Social Engineering

 
Network Attack

 
Application Attack

Question 12 1
/ 1 pts

A ______________ is a malicious program, which replicates itself and


infects the files and programs of your PC and can make them non-
functional.

 
Computer Attack

 
Application Software

 
Social Engineering

Correct!  
Computer Virus

Question 13 1
/ 1 pts

__________ is a code that is made to stealthily affect a compromised


computer system without the consent of the user

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 6/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

Correct!  
Malware

 
Adware

 
Trojan

 
Ransomware

Question 14 0
/ 1 pts

This provides confidentiality, integrity and authentication to the vast


majority of today's WWW traffic.

 
DNS

orrect Answer  
HTTPS

 
DOMAIN

ou Answered  
Cyber security

Question 15 1
/ 1 pts

It is called _____________  because it forms a ring as each computer is


connected to another computer, with the last one connected to the first.

 
hybrid topology

 
star topology

Correct!  
ring topology

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 7/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

 
bus topology

Question 16 0
/ 1 pts

Which of the following does not belong to the group?

ou Answered  
MSN

 
Google

 
Yahoo

orrect Answer  
Microsoft Edge

Question 17 1
/ 1 pts

______________ is a network type in which every computer and network


device is connected to a single cable. When it has exactly two endpoints

 
Hybrid Topology

 
Ring Topology

Correct!  
Bus topology

 
Star Topology

Question 18 1
/ 1 pts

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 8/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

In _________ topology each device in the network is connected to a


central device called hub. 

Correct!  
Star

 
Ring

 
Bus

 
Mesh

Question 19 1
/ 1 pts

It is a program with a graphical user interface for displaying HTML files,


used to navigate the World Wide Web.

 
Search Engine

Correct!  
Web Browser

 
DNS

 
Domain

Question 20 0
/ 1 pts

Which of the following IP addresses does not belong to the group?

orrect Answer  
255.255.255.255

ou Answered  
10.0.0.0

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 9/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

 
172.16.0.0

 
192.168.0.0

Question 21 1
/ 1 pts

Which of the following statements is false?

 
IP it is an identifying number that is associated with a specific computer or
computer network.

Correct!  
IP address stands for internet premise address

 
When connected to the internet, the IP address allows the computers to
send and receive information.

 
IP Address is the number assigned to a network equiped piece of
hardware by which other device identify it.

Question 22 1
/ 1 pts

_____ is a type of crime that involves unlawfully taking or using property


that belongs to another person or entity

Correct!  
Theft

 
Spyware

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 10/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

 
Malware

 
Social Engineering

Question 23 1
/ 1 pts

A ______ is a collection of content, often on multiple pages, that is


grouped together under the same domain

 
URL

 
HTTP

Correct!  
website

 
domain name

Question 24 1
/ 1 pts

This protocol is used on the Internet to allow clients to request web pages
from web servers and to allow client interaction with those web servers.

 
SSL

 
SMTP

 
TLS

Correct!  
HTTP

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 11/12
12/10/21, 1:22 PM M1-Q3 : Introduction to Computing- BIT

Question 25 1
/ 1 pts

Which of the following does not belong to the group?

 
Google Chrome

 
Internet Explorer

 
Opera

Correct!  
Yahoo

Quiz Score:
21 out of 25

https://sanbeda.instructure.com/courses/5250/quizzes/16433?module_item_id=114713 12/12

You might also like