Search Header Logo

красотканаргизаа

Authored by Наргиза Кайырбекова

English

University

Used 98+ times

красотканаргизаа
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is the name of a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

 Spyware

 Firewall

 Virus

 Norton

 intrusion detection  

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Encryption information is…:

A conversion process in which information is deleted.

The process of its transformation, in which the content of information is changed to a false

The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects

The process of converting information into machine code

Identification protocol

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Software information protection

cryptography

uninterrupted power supply unit

backup

data duplication

Desepticons invasion

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Ensuring the accuracy and completeness of information and methods of its processing.

Confidentiality

Integrity 

Availability

Feasibility

Dr. Web

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Providing access to information only to authorized users?

Privacy

integrity

Availability

Feasibility

Dr. Web

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 The greatest threat to network security pose

opening standard user account

opening of the standard account administrator group

copying files that have been changed during the day, without a backup mark

main menu

unauthorized access, electronic eavesdropping and intentional or unintentional damage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is Information Security?

PC security measures

the security of personal information

Identification protocol

Measures to protect information from unauthorized access

Software update

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?