Search Header Logo

F2 Sys Security/Comp Crimes

Authored by Steffenie Ali-Paul

Computers

5th Grade

Used 11+ times

F2 Sys Security/Comp Crimes
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Protecting data from unauthorized access is called

data integrity

data security

software

electronic eavesdropping

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data integrity can be compromised in a number of ways except

human error

natural disasters

viruses

encryption

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

System security concerns the protection of the following except

hardware

software

worms

data

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data integrity concerns

consistency of data

accuracy of data

reliability of data

all of the above

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is not an example of human error?

inaccurate data entry

electronic eavesdropping

accidental deletion

accidental changing of data

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is not a form of physical data security?

passwords

locks

burglar alarms

electronic doors

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

__________ is a form of physical data backup involving the removal of inactive files from the computer to be accessed at a later date.

scanning

encrypting

archiving

deleting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?