
F2 Sys Security/Comp Crimes
Authored by Steffenie Ali-Paul
Computers
5th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Protecting data from unauthorized access is called
data integrity
data security
software
electronic eavesdropping
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data integrity can be compromised in a number of ways except
human error
natural disasters
viruses
encryption
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
System security concerns the protection of the following except
hardware
software
worms
data
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data integrity concerns
consistency of data
accuracy of data
reliability of data
all of the above
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is not an example of human error?
inaccurate data entry
electronic eavesdropping
accidental deletion
accidental changing of data
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is not a form of physical data security?
passwords
locks
burglar alarms
electronic doors
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
__________ is a form of physical data backup involving the removal of inactive files from the computer to be accessed at a later date.
scanning
encrypting
archiving
deleting
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?