
ИКТ 61-125
Authored by Ажар Есет
Computers
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
65 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
… is the practice, policies and principles to protect digital data and other kinds of information
Information technology
Information security
Information resource
Information system
Information unsecurity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is the protection of computing systems and the data they store or access
Computer technology
Computer Security
Computer resource
Computer system
Computer insecurity
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
…ensures that data exchanged is not accessible to unauthorized users
Integrity
Confidentiality
Availability
Reliability
Versatality
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
… is the ability to ensure that a system and its data has not suffered unauthorized modification
Confidentiality
Integrity
Availability
Reliability
Versatality
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
… guarantees that systems, applications and data are available to users when they need them
Confidentiality
Availability
Integrity
Reliability
Versatality
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
… guarantees that systems, applications and data are available to users when they need them
Confidentiality
Availability
Integrity
Reliability
Versatality
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
… is a harmful computer program developed by a person that disrupts operations of a computer in various ways
Operating System
Computer virus
Library programs
Utility programs
Versatality
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?