WJEC Computer Science KO - Security and Data Management

WJEC Computer Science KO - Security and Data Management

11th Grade

9 Qs

quiz-placeholder

Similar activities

7 OCR GCSE Computer Science - System Software

7 OCR GCSE Computer Science - System Software

10th - 11th Grade

10 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Lossy & Lossless Compression

Lossy & Lossless Compression

9th - 12th Grade

15 Qs

STM OCR GCSE Computer Science: Section 1, Test 2

STM OCR GCSE Computer Science: Section 1, Test 2

9th - 11th Grade

12 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Topic 2.3 Keywords

Topic 2.3 Keywords

9th - 11th Grade

11 Qs

AQA - Section 4 - Utility System Software

AQA - Section 4 - Utility System Software

11th Grade

10 Qs

WJEC Computer Science KO - Security and Data Management

WJEC Computer Science KO - Security and Data Management

Assessment

Passage

Computers

11th Grade

Easy

Created by

ICT Pentrehafod

Used 2+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of encryption?

Conversion of data into a form that may be decompressed without any loss of data

Conversion of data into cyphertext that cannot be understood by people without the decryption key

The process of reducing file size to allow more data to be stored on the disk

The range of measures that can be taken to protect computer systems from cyberattack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of reducing file size to allow more data to be stored on the disk and increase transfer speeds?

Compression

Encryption

Backup

Archiving

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a copy of data that can be used if the original data is lost?

Compression

Archiving

Backup

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for any kind of computer software written to enable a cyberattack?

Vulnerabilities

Cookies

Malware

Cybersecurity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the range of measures that can be taken to protect network data from accidental or malicious damage?

Network security

Encryption

Cybersecurity

Compression

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of storing data that is not in current use for security, legal or historical reasons?

Archiving

Encryption

Backup

Compression

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for any kind of computer software written to enable a cyberattack?

Vulnerabilities

Cookies

Malware

Cybersecurity

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of reducing file size to allow more data to be stored on the disk and increase transfer speeds?

Encryption

Archiving

Backup

Compression

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the range of measures that can be taken to protect computer systems from cyberattack?

Network security

Cybersecurity

Compression

Encryption