Search Header Logo

Working Securely With Data

Authored by Andrew Murden

Business, Computers

University

Used 4+ times

Working Securely With Data
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A faulty what can cause data to become corrupt?

Scanner

Hard Disc

Printer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is unlikely to damage or delete data?

System crash

Archiving

Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which would be the best method of backing up your data?

Printing out paper copies and filing them away

Keep a second copy of the data on your hard disk

Make a copy on a removable storage device, eg CD, DVD, external hard disk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where should backups ideally be kept?

On the computer's hard disk

Near the computer

In a separate room or off site

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to restrict access to secure data, a system of what should be used?

Passwords

Anti-virus software

Multi-user operating system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Converting data into a secret code so that it cannot be read by an unauthorised person is called what?

Inscription

Encryption

De-encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a physical precaution to protect data?

Locks on cupboard or room doors

Security guards

Passwords

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?