
Data Integrity and Security Review
Authored by Vanessa Brown
Instructional Technology
11th Grade
Used 51+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
When data it is converted back to original text, it is said to be _______________.
restricted access
encrypted
restricted software
2.
MULTIPLE SELECT QUESTION
10 sec • 1 pt
What are some physical means of protecting data?
Password
Key card
Cabinets
Virus protection
ID Card
3.
FILL IN THE BLANK QUESTION
10 sec • 1 pt
Data _____________ refers to the data that is
accurate and up to date. While data ______________is the protection of data.
(a)
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not true about Viruses?
Corrupt data
Enables proper functioning of programs
Damage software
None of the above
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A software that defends the weak points in a computer network is a ?
Encryption Software
Virus Protection Software
Firewall Software
All the above
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is breach of integrity ?
This type of violation involves unauthorized reading of data
This violation involves unauthorized modification of data
This violation involves unauthorized destruction of data
This violation involves unauthorized use of resources
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Accurate and complete data enters the system for processing and remains accurate thereafter, is said to have:
Viruses
Integrity
Security
Accidental deletion.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?