security and ethical factors

security and ethical factors

1st - 5th Grade

16 Qs

quiz-placeholder

Similar activities

Digi Walk Set 1

Digi Walk Set 1

1st - 5th Grade

20 Qs

Brain Quest Difficult Round

Brain Quest Difficult Round

4th - 6th Grade

20 Qs

ITRM&DR QUIZ

ITRM&DR QUIZ

1st - 5th Grade

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

1st Grade

15 Qs

Network Knowledge

Network Knowledge

4th Grade

20 Qs

Waves and Information Review

Waves and Information Review

4th Grade

21 Qs

Body Systems

Body Systems

5th Grade

12 Qs

S.T.E.A.M. VOCABULARY II

S.T.E.A.M. VOCABULARY II

5th Grade

12 Qs

security and ethical factors

security and ethical factors

Assessment

Quiz

Science

1st - 5th Grade

Hard

Created by

Pantelitsa Photiou

Used 29+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer security provide protection of

system, information and data

peripheral devices

private information

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

System security is the protection of the

hardware

software

data

disk drives

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are the aspects of Information security of data

confidentiality

integrity

availability

All the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The filed of study that analyzes the morality of human behaviours, policies, laws and social structures is _________

Computer crime

Computer security

Ethic

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________analyzes moral responsibilities of computer professionals and computer users and ethical issues in public policy for information technology development and use.

Computer ethics

Ethic

Computer crime

Computer security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________is an act performed by a knowledgeable computer user, that illegally browses or steals a company's or individual's private information

Computer Virus

Computer Crime

Malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacker gain unauthorized access and

steal information and software

delete programs

corrupt programs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?