EXAM IAS

EXAM IAS

University

40 Qs

quiz-placeholder

Similar activities

Evolução histórica dos computadores

Evolução histórica dos computadores

University

42 Qs

2nd Year Data Structures Quiz Qn

2nd Year Data Structures Quiz Qn

University

35 Qs

Методы мошенничества и противодействия

Методы мошенничества и противодействия

University

40 Qs

TRABALHO - 2º TRIMESTRE- Banco de Dados

TRABALHO - 2º TRIMESTRE- Banco de Dados

11th Grade - University

40 Qs

PH 2. KLS 7

PH 2. KLS 7

7th Grade - University

38 Qs

Quiz Informatika SMP

Quiz Informatika SMP

9th Grade - University

35 Qs

ASAT Teknologi Informasi & Komikasi Kelas 8

ASAT Teknologi Informasi & Komikasi Kelas 8

8th Grade - University

40 Qs

Quiz sur Apollo GraphQL

Quiz sur Apollo GraphQL

University

38 Qs

EXAM IAS

EXAM IAS

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

twentinyne twentinyne

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provide with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human computer interaction.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a set of measures intended to protect and defend

information and information systems.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A practice of defending information from unauthorized access,

use, disclosure, disruption, modification, perusal, inspection,

recording or destruction.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

- also referred as “computer security”.

- information security applied to technology, most often some

form of computer system.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An act of ensuring that data is not lost when critical issues arise.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malicious act that aims to corrupt or steal data or disrupt an

organization's systems or the entire organization.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A manipulative technique used to deceive individuals into

revealing sensitive or personal information by posing as a

trustworthy source.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?