security and ethical factors

security and ethical factors

1st - 5th Grade

16 Qs

quiz-placeholder

Similar activities

Human Body System

Human Body System

5th Grade

12 Qs

STEM

STEM

KG - 12th Grade

15 Qs

Tynker Vocabulary-Crazy for Coding-GY23

Tynker Vocabulary-Crazy for Coding-GY23

4th Grade

18 Qs

Guessing Game АЯдПО_С2018_КБЕЗ_2#С

Guessing Game АЯдПО_С2018_КБЕЗ_2#С

KG - 4th Grade

13 Qs

Keamanan Komputer

Keamanan Komputer

3rd Grade

18 Qs

I Can Be A Maker

I Can Be A Maker

5th Grade

20 Qs

JSS 3 Computer 2ND TERM

JSS 3 Computer 2ND TERM

2nd Grade

20 Qs

Technology 4th

Technology 4th

4th Grade

20 Qs

security and ethical factors

security and ethical factors

Assessment

Quiz

Science

1st - 5th Grade

Hard

Created by

Pantelitsa Photiou

Used 29+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer security provide protection of

system, information and data

peripheral devices

private information

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

System security is the protection of the

hardware

software

data

disk drives

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are the aspects of Information security of data

confidentiality

integrity

availability

All the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The filed of study that analyzes the morality of human behaviours, policies, laws and social structures is _________

Computer crime

Computer security

Ethic

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____________analyzes moral responsibilities of computer professionals and computer users and ethical issues in public policy for information technology development and use.

Computer ethics

Ethic

Computer crime

Computer security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________is an act performed by a knowledgeable computer user, that illegally browses or steals a company's or individual's private information

Computer Virus

Computer Crime

Malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacker gain unauthorized access and

steal information and software

delete programs

corrupt programs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?