
BTEC Ways of Restricting User access to Data
Authored by damian hall
Computers
10th Grade
Used 50+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person that does not have permission to access data on a computer is called an ...
unauthorised user
authorised user
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Another word for an unauthorised user could be...
purple hat hacker
pink hat hacker
black hat hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To prevent unauthorised users from accessing data on computers we use a...
password
pastword
pasword
possword
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A physical security method we can use to prevent unauthorised access to computers:
never lock door to computer room
lock toilet door
lock door to computer room
lock kitchen door
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A physical security method we can use to prevent unauthorised access to computers:
use a keypad old entry system
use a keypad code entry system
use a keypad sold entry system
use a keypad bold entry system
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A physical security method we can use to prevent unauthorised access to computers:
use a card entry system
leave the computer room door wide open
use a birthday card entry system
use a greetings card entry system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A physical security method we can use to prevent unauthorised access to computers:
use a six finger scanner
use a bionic finger scanner
use a biometric finger print scanner
use a biology scanner system
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?