красотканаргизаа

красотканаргизаа

University

60 Qs

quiz-placeholder

Similar activities

CSET Multiple subjects Subtest 1(English MC)

CSET Multiple subjects Subtest 1(English MC)

University

64 Qs

2.2 - Progress Test 1 - VOCA & GRAM

2.2 - Progress Test 1 - VOCA & GRAM

University

60 Qs

20210323 - AV1 - Test1

20210323 - AV1 - Test1

5th Grade - University

56 Qs

PRE Lesson 14 HW (Revision for FINAL - GK)

PRE Lesson 14 HW (Revision for FINAL - GK)

University

60 Qs

M3 Entrep

M3 Entrep

University

62 Qs

1225 - Review 5 - Technology & you

1225 - Review 5 - Technology & you

University

60 Qs

Verbal Communication

Verbal Communication

University

62 Qs

B&R Chapter 10, "Locating, Mining, & Citing Sources"

B&R Chapter 10, "Locating, Mining, & Citing Sources"

University

58 Qs

красотканаргизаа

красотканаргизаа

Assessment

Quiz

English

University

Medium

Created by

Наргиза Кайырбекова

Used 98+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is the name of a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

 Spyware

 Firewall

 Virus

 Norton

 intrusion detection  

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Encryption information is…:

A conversion process in which information is deleted.

The process of its transformation, in which the content of information is changed to a false

The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects

The process of converting information into machine code

Identification protocol

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Software information protection

cryptography

uninterrupted power supply unit

backup

data duplication

Desepticons invasion

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Ensuring the accuracy and completeness of information and methods of its processing.

Confidentiality

Integrity 

Availability

Feasibility

Dr. Web

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Providing access to information only to authorized users?

Privacy

integrity

Availability

Feasibility

Dr. Web

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 The greatest threat to network security pose

opening standard user account

opening of the standard account administrator group

copying files that have been changed during the day, without a backup mark

main menu

unauthorized access, electronic eavesdropping and intentional or unintentional damage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is Information Security?

PC security measures

the security of personal information

Identification protocol

Measures to protect information from unauthorized access

Software update

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?