Chapter4-Grade8

Chapter4-Grade8

8th Grade

8 Qs

quiz-placeholder

Similar activities

Computer Privacy and security

Computer Privacy and security

6th - 8th Grade

11 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

Cybersecurity

Cybersecurity

6th - 8th Grade

13 Qs

Computer

Computer

8th - 9th Grade

13 Qs

Information technology 3 unit 7 hackers

Information technology 3 unit 7 hackers

1st - 12th Grade

12 Qs

Term 6 - Quiz 3

Term 6 - Quiz 3

7th - 9th Grade

11 Qs

Cyber Threat

Cyber Threat

8th Grade

10 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

Chapter4-Grade8

Chapter4-Grade8

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Faiza Salman

Used 11+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________________ describes methods for ensuring that data stored on a computer system is protected against unauthorized access

Data Duplication

Hacking

Information Security.

None of the above.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If files are sensitive or confidential, they need to be_________.

Deleted

Protected

Erased

All of the above.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A _________________ should be used to prevent unauthorized people accessing, viewing or editing the data.

person status

person's address

email address

password

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Passwords should also be changed regularly to prevent the possibility of misuse by unauthorized people.

True

False

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The permissions that are granted to a user, or to an application, to read, write and erase files in the computer is called ______________.

user name

access rights

password

None of the above

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ of files should be carried out on a regular basis; hourly, daily or weekly

stealing

Backing up

Hacking

Deleting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The back up storage should be removed from the site and stored in a theft proof, fireproofs and waterproof environment.

True

False

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

People should not be Security conscious of Information stored in portable appliances such as Laptops, PDA’S and Mobile phones

True

False

Discover more resources for Computers