Want to see correct answers?
Login or join for free!
  printable Worksheets
Looking for printable worksheets?
Check out our pre-made printable worksheets!
Share/Like This Page
Filter By Grade

You are browsing College questions. View questions in All Grades.

Grade 9 Grade 10 Grade 11 Grade 12 College Continuing Education

College Business Technology Questions

You can create printable tests and worksheets from these College Business Technology questions! Select one or more questions using the checkboxes above each question. Then click the add selected questions to a test button before moving to another page.

Previous Page 3 of 3 Next
College Business Technology
Computers in red-light systems perform all of the following functions EXCEPT                                                                                                    .
  1. adding a date, time, and location to the photo
  2. instructing a digital camera to take a picture of a violating car as it enters the intersection
  3. sending an electronic message to the violator
  4. instructing a digital camera to take a picture of a violating car in the middle of the intersection
College Business Technology
Which of the following most accurately defines vulnerability
  1. A set of circumstances that has the potential to cause harm
  2. A weakness in the system that an entity exploit to cause harm
  3. Techniques for keeping data and resources hidden.
  4. Techniques for detecting unexpected behavior
  5. A measure of trustworthiness relying on the risk leverage
  6. Evidence of how much not to trust a system
  7. The technique of using first letter of each word in normal English text to conceal a secret message.
  8. Unauthorized control of some part of a system
College Business Technology
College Business Technology
The Enigma cipher is an example of which of the following types of ciphers?
  1. Substitution
  2. Transposition
  3. Proposition
  4. Product
  5. Caeser
  6. Rail-Fence
  7. Columnar
  8. Book
Previous Page 3 of 3 Next