
J808 LO4.4 Preventative Measures (Destruction of Data)
Authored by David Anderson
Computers
10th - 11th Grade
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of these is a secure method for destroying data?
Over writing the data
Backing up the data
Encrypting the data
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which method of destroying data uses software and creates random, meaningless data using binary 1s and 0s?
Data Thrashing
Wiping data
Overwriting data
Cleaning data
Answer explanation
See p78
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which method of data uses an ____________ field making data unreadable?
Magnetic
Negative
Electrostatic
Static Electical
Answer explanation
See p78
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which is the most secure method of data destrution?
Overwriting data
Magnetic wipe
Physical destruction
Answer explanation
See p78
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which devices are best used to destroy data on a Hard Disk Drive, thoroughly destroying the data so it cannot be recovered?
Hammer
Magnet
Shredder
Drill
Answer explanation
See p78
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which device was used to destroy the unpublished novels of Terry Pratchett after his death in 2017?
Hammer
Drill
Roller coaster
Steamroller
Answer explanation
See P78
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which method of destruction is best used to destroy data stored on a commonly used non-electrical data storage format?
Magnet
Shredder
Hammer
Fire
Answer explanation
See p79
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?