Chapter4-Grade8

Chapter4-Grade8

8th Grade

8 Qs

quiz-placeholder

Similar activities

python quiz

python quiz

6th Grade - Professional Development

10 Qs

Micro:bit

Micro:bit

4th Grade - University

12 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

Adventure game project

Adventure game project

7th - 8th Grade

12 Qs

What is a program slides(6:16)

What is a program slides(6:16)

8th - 12th Grade

10 Qs

Tables in HTML

Tables in HTML

7th - 8th Grade

10 Qs

Youtube

Youtube

4th Grade - University

11 Qs

Chapter4-Grade8

Chapter4-Grade8

Assessment

Quiz

Computers

8th Grade

Practice Problem

Easy

Created by

Faiza Salman

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________________ describes methods for ensuring that data stored on a computer system is protected against unauthorized access

Data Duplication

Hacking

Information Security.

None of the above.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If files are sensitive or confidential, they need to be_________.

Deleted

Protected

Erased

All of the above.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A _________________ should be used to prevent unauthorized people accessing, viewing or editing the data.

person status

person's address

email address

password

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Passwords should also be changed regularly to prevent the possibility of misuse by unauthorized people.

True

False

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The permissions that are granted to a user, or to an application, to read, write and erase files in the computer is called ______________.

user name

access rights

password

None of the above

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ of files should be carried out on a regular basis; hourly, daily or weekly

stealing

Backing up

Hacking

Deleting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The back up storage should be removed from the site and stored in a theft proof, fireproofs and waterproof environment.

True

False

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

People should not be Security conscious of Information stored in portable appliances such as Laptops, PDA’S and Mobile phones

True

False