Search Header Logo

Study Guide Part 7 (Module 5)

Authored by KEDRAL TIMMONS

Computers

9th - 12th Grade

Used 1+ times

Study Guide Part 7 (Module 5)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An encryption _____ is a set of steps that converts readable text into unreadable text.

series

algorithm

method

key

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An encryption ______ is a set of characters that the originator of the data used to encrypt, and the recipient of the data uses to decrypt.

password

algorithm

code

key

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

The company storing the data must protect against data loss due to physical disasters.

When transferring data over a network to the cloud, the data should be encrypted and authenticated.

Cloud storage companies have increased.

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

FERPA regulates the confidentiality of ________

criminal records

students' educational records.

financial transactions

user names and passwords

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is not recommended to protect against hardware failure?

surge protector

UPS

cables and locks

duplicate components

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?