Data Security & Data Integrity

Data Security & Data Integrity

10th - 11th Grade

21 Qs

quiz-placeholder

Similar activities

Proses Komunikasi Data Pada Jaringan

Proses Komunikasi Data Pada Jaringan

11th Grade

20 Qs

Základní části počítače a ergonomie

Základní části počítače a ergonomie

9th - 10th Grade

16 Qs

Pretest TIK

Pretest TIK

10th Grade

20 Qs

TECHNO QUIZINE

TECHNO QUIZINE

11th - 12th Grade

20 Qs

Exam Style Questions

Exam Style Questions

10th - 11th Grade

18 Qs

ULANGAN HARIAN KONSEP DASAR JARINGAN KOMPUTER

ULANGAN HARIAN KONSEP DASAR JARINGAN KOMPUTER

10th Grade

17 Qs

Informática I (17-18-A)

Informática I (17-18-A)

10th Grade

20 Qs

Advantages and Disadvantages of Collecting Data

Advantages and Disadvantages of Collecting Data

10th Grade

20 Qs

Data Security & Data Integrity

Data Security & Data Integrity

Assessment

Quiz

Computers

10th - 11th Grade

Practice Problem

Medium

Created by

Collin Dosunmu

Used 505+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The accuracy, reliability and consistency of data

Data integrity

Data security

Data archiving

Data entry

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who uses computers to gain unauthorized access to data

Saboteur

Hacker

Fraudster

Criminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that attaches itself to an executable piece of software, and then reproduces itself when the file is run.

Worm

Trojan horse

Malware

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Measures that are put in place to ensure data is safe

Data integrity

Data protection

Data security

Data authorisation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any act using computers/the Internet to defraud people

Computer fraud

Phising

Keylogging

Identity theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The illegal practice of monitoring/investigating another business for a competitive advantage

Electronic eavesdropping

Propaganda

Industrial espionage

Software piracy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An input device that identifies a person based on the individual’s characteristics/traits (fingerprint)

Biometric scan

Biological print

Electronic footprint

Retinal scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?