
Security and Integrity of Data
Authored by Sharon Stewart
Business
5th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The accuracy, reliability and consistency of data
Data integrity
Data security
Data archiving
Data entry
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person who uses computers to gain unauthorized access to data
Saboteur
Hacker
Fraudster
Criminal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious program that attaches itself to an executable piece of software, and then reproduces itself when the file is run.
Worm
Trojan horse
Malware
Virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Measures that are put in place to ensure data is safe
Data integrity
Data protection
Data security
Data authorisation
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hardware/software that protects a network from hostile intrusion that could compromise confidentiality or result in data corruption.
Blocking app
Firewall
Anti-virus software
Password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The illegal use of someone else's personal information (as a Social Security number) in order to obtain money or for some other personal gain
Internet fraud
Identity theft
Credit card fraud
Telemarketing schemes
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of converting data into a code, especially to prevent unauthorized access
Program
Coding
Encryption
Algorithm
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?