Chapter4-Grade8

Chapter4-Grade8

8th Grade

8 Qs

quiz-placeholder

Similar activities

Computer Virus

Computer Virus

6th - 8th Grade

10 Qs

CyberSecurity

CyberSecurity

6th Grade - Professional Development

10 Qs

Day 2 Digital Boot Camp Review

Day 2 Digital Boot Camp Review

6th - 8th Grade

11 Qs

File Management pt 1

File Management pt 1

8th Grade

11 Qs

Microsoft OneDrive FUN Quiz 😍

Microsoft OneDrive FUN Quiz 😍

6th - 8th Grade

8 Qs

WORKING IN WINDOWS 7

WORKING IN WINDOWS 7

7th - 12th Grade

10 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

Cloud Computing Terminology

Cloud Computing Terminology

7th - 10th Grade

13 Qs

Chapter4-Grade8

Chapter4-Grade8

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Faiza Salman

Used 11+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________________ describes methods for ensuring that data stored on a computer system is protected against unauthorized access

Data Duplication

Hacking

Information Security.

None of the above.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If files are sensitive or confidential, they need to be_________.

Deleted

Protected

Erased

All of the above.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A _________________ should be used to prevent unauthorized people accessing, viewing or editing the data.

person status

person's address

email address

password

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Passwords should also be changed regularly to prevent the possibility of misuse by unauthorized people.

True

False

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The permissions that are granted to a user, or to an application, to read, write and erase files in the computer is called ______________.

user name

access rights

password

None of the above

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ of files should be carried out on a regular basis; hourly, daily or weekly

stealing

Backing up

Hacking

Deleting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The back up storage should be removed from the site and stored in a theft proof, fireproofs and waterproof environment.

True

False

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

People should not be Security conscious of Information stored in portable appliances such as Laptops, PDA’S and Mobile phones

True

False