Want to see correct answers?
Login or join for free!
  printable Worksheets
Looking for printable worksheets?
Check out our pre-made printable worksheets!
Share/Like This Page
Filter By Grade

College Technology Questions

You can create printable tests and worksheets from these College Technology questions! Select one or more questions using the checkboxes above each question. Then click the add selected questions to a test button before moving to another page.

Previous Page 4 of 5 Next
College Business Technology
Computers in red-light systems perform all of the following functions EXCEPT                                                                                                    .
  1. adding a date, time, and location to the photo
  2. instructing a digital camera to take a picture of a violating car as it enters the intersection
  3. sending an electronic message to the violator
  4. instructing a digital camera to take a picture of a violating car in the middle of the intersection
College Business Technology
Which of the following most accurately defines vulnerability
  1. A set of circumstances that has the potential to cause harm
  2. A weakness in the system that an entity exploit to cause harm
  3. Techniques for keeping data and resources hidden.
  4. Techniques for detecting unexpected behavior
  5. A measure of trustworthiness relying on the risk leverage
  6. Evidence of how much not to trust a system
  7. The technique of using first letter of each word in normal English text to conceal a secret message.
  8. Unauthorized control of some part of a system
College Networks
College Technology
GPS stands for:
  1. global positioning by satellite
  2. global positioning system
  3. geographic positioning system
  4. geographic positioning by satellite
College Business Technology
College Business Technology
The Enigma cipher is an example of which of the following types of ciphers?
  1. Substitution
  2. Transposition
  3. Proposition
  4. Product
  5. Caeser
  6. Rail-Fence
  7. Columnar
  8. Book
College Networks
College PC Basics
College PC Basics
In a                 network, all nodes are considered equal.
  1. PC-to-modem
  2. peer-to-peer
  3. peer-to-server
  4. server-to-modem
College Networks
Which is the most effective arrangement in regards to keeping a system of nodes running?
  1. Star Topology
  2. Ring Topology
  3. Bus Topology
  4. Spiral Topology
Previous Page 4 of 5 Next