Technology and security

Technology and security

12th Grade

20 Qs

quiz-placeholder

Similar activities

Business Law Unit 6

Business Law Unit 6

12th Grade

15 Qs

Objectives

Objectives

12th Grade - University

20 Qs

Quiz sobre Mecanismos de Seguridad

Quiz sobre Mecanismos de Seguridad

12th Grade

15 Qs

Market Research

Market Research

10th - 12th Grade

21 Qs

google colaboratory latihan

google colaboratory latihan

4th Grade - University

17 Qs

Gmetrix D2 - L1

Gmetrix D2 - L1

9th Grade - University

15 Qs

Chapter 7 Market Research

Chapter 7 Market Research

9th - 12th Grade

15 Qs

Conducting Marketing Research

Conducting Marketing Research

11th - 12th Grade

16 Qs

Technology and security

Technology and security

Assessment

Quiz

Business

12th Grade

Medium

Created by

Patrick AdjeiTutu

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Automating processes in a cloud accounting package means data entry will always be accurate.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access to real time data enables an organisation to more easily take advantage of offshore outsourcing

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Third party apps and plug ins can represent an increased security risk.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Breaches of data protection are taken seriously and carry heavy penalties of up to__, %

£16.5million, 4% of turnover

£17.5million, 4% of turnover

£17million, 4% of turnover

£17million, 5% of turnover

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This entity shall be responsible for, and be able to demonstrate compliance with the data principles

Data processor

Data subject

Data controller

Cyber Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify what is being described here. ‘A digital ledger of transactions that is shared across the entire network of computers.’ Select one option

Data analytics

Blockchain

Machine learning

Artificial intelligence

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When fraudulent communications that appear to come from legitimate sources try to steal information, spread viruses or ransomware is called?

Pharming

Malware

Smishing

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?