Risks Associated with Technology Use

Risks Associated with Technology Use

University

100 Qs

quiz-placeholder

Similar activities

TES SKD

TES SKD

University

100 Qs

Final Exam in LEA 1

Final Exam in LEA 1

University

100 Qs

Fragments, Run-ons, Compound Sentences

Fragments, Run-ons, Compound Sentences

4th Grade - University

103 Qs

Introduction to Artificial Intelligence

Introduction to Artificial Intelligence

University

100 Qs

latihan US 2024 2025

latihan US 2024 2025

9th Grade - University

100 Qs

Program PLC 2023

Program PLC 2023

University

95 Qs

Logo Quiz

Logo Quiz

University

95 Qs

SEMAT

SEMAT

University - Professional Development

97 Qs

Risks Associated with Technology Use

Risks Associated with Technology Use

Assessment

Quiz

Education

University

Medium

Created by

DR SITTI SYAMSIAR MUHARRAM

Used 1+ times

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a risk?

A certain event that always results in a loss

Any possibility that something might occur resulting in an injury or a loss

A type of computer virus

A type of software

Answer explanation

A risk is defined as any possibility that something might occur resulting in an injury or a loss. This encompasses uncertainties, unlike the incorrect options which are too specific or unrelated.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital security risk is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or ________ capability.

processing

storage

display

network

Answer explanation

The correct answer is 'processing' because digital security risks can affect the ability of devices to process data, which is crucial for their functionality. Other options like storage and display are important but not as fundamental as processing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Types of digital security risks include threats to our information, physical health, mental health, and the ________.

environment

economy

education

transportation

Answer explanation

Digital security risks can impact various aspects of life, including the environment. Threats such as data breaches and cyberattacks can lead to environmental harm, making 'environment' the correct choice.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State-sponsored attackers are employed by the government to launch computer attacks against their enemies through _________.

nation-state actors

script kiddies

hacktivists

insider threats

Answer explanation

State-sponsored attackers are referred to as nation-state actors, as they are government-employed individuals or groups that conduct cyber attacks against other nations or entities.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'cyberwarfare' describe?

A) A type of social engineering

B) An attack whose goal ranges from disabling a government’s computer network to crippling a country

C) The process of sifting through Big Data

D) A type of phishing attack

Answer explanation

The term 'cyberwarfare' refers to attacks aimed at disrupting or damaging a nation's computer networks, potentially leading to significant harm, such as crippling a country's infrastructure, making option B the correct choice.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These attackers try to steal and then use your credit card numbers, online financial account information, or Social Security numbers using _________.

data mining

phishing

encryption

firewall

Answer explanation

Attackers use data mining to gather personal information like credit card numbers and Social Security numbers for fraudulent purposes. Phishing is a method to trick users into providing such information, but data mining is the correct term for the act of stealing it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data mining is the process of sifting through ________ to find the important questions that will yield fruitful results.

Big Data

Small Data

Random Data

Structured Data

Answer explanation

Data mining involves analyzing large sets of data, known as Big Data, to uncover patterns and insights. This process is essential for identifying significant questions that can lead to valuable outcomes.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?