EXAM IAS

EXAM IAS

University

40 Qs

quiz-placeholder

Similar activities

Ujian Akhir Semester Informatika

Ujian Akhir Semester Informatika

7th Grade - University

40 Qs

SUMATIF AKHIR SEMESTER INFORMATIKA KELAS 9

SUMATIF AKHIR SEMESTER INFORMATIKA KELAS 9

8th Grade - University

45 Qs

Kelas 7 Komputasional

Kelas 7 Komputasional

7th Grade - University

40 Qs

PREPAIR ASAS 2024

PREPAIR ASAS 2024

9th Grade - University

35 Qs

Ulangan Harian.1.1

Ulangan Harian.1.1

10th Grade - University

36 Qs

MedLit Copyryt

MedLit Copyryt

12th Grade - University

45 Qs

8 CĐ 2 full

8 CĐ 2 full

7th Grade - University

37 Qs

kelas 2 ats

kelas 2 ats

8th Grade - University

35 Qs

EXAM IAS

EXAM IAS

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

twentinyne twentinyne

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provide with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human computer interaction.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a set of measures intended to protect and defend

information and information systems.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A practice of defending information from unauthorized access,

use, disclosure, disruption, modification, perusal, inspection,

recording or destruction.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

- also referred as “computer security”.

- information security applied to technology, most often some

form of computer system.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An act of ensuring that data is not lost when critical issues arise.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malicious act that aims to corrupt or steal data or disrupt an

organization's systems or the entire organization.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A manipulative technique used to deceive individuals into

revealing sensitive or personal information by posing as a

trustworthy source.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?