5.5 Digital Security

5.5 Digital Security

12th Grade

15 Qs

quiz-placeholder

Similar activities

Numpy-1

Numpy-1

9th - 12th Grade

10 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

Word 2016 Lesson 1

Word 2016 Lesson 1

9th - 12th Grade

10 Qs

Computer Hardware - CPU & GPU

Computer Hardware - CPU & GPU

7th Grade - University

16 Qs

ICT as Platform for Change

ICT as Platform for Change

11th - 12th Grade

10 Qs

emtech

emtech

12th Grade

10 Qs

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

5.5 Digital Security

5.5 Digital Security

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Used 63+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

description of digital security

the protection of a computer's internet account and files from intrusion by an outside user
the management of change and development within a business or similar organization.
a monitor filtersthat decrease the viewing angle of a monitor, preventing it from being viewed from the side;
prejudice for or against one person or group, especially in a way considered to be unfair.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

description of firewalls

a network security system designed to prevent unauthorized access to or from a private network
Discrimination based on gender, especially discrimination against women
The way that the data collected by an organisation is reported, and who it is shared with.
change in busines practice, legislation, competition

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

list of digital security

AV software, firewalls, anti-spyware, pemissions, encryption, username/password
potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage.
can be insufficient to hide data, need to repaeat several times
degausser has vry strong magnet or electromagntic coil, can damage disk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

characteristics of anti-spyware

controliing surfing habits, adware, tracking cookies
destroy hard drive with a hammer, fire, strong magnet, or crushing
making changes to the network ot make it work more effeciently
prejudice for or against one person or group, especially in a way considered to be unfair.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

characteristics of permissions

groups of users get similar access
groups of users get similar access
gain unauthorized access to data in a system or computer
ability to get access to a computer or a network from a remote distance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

description of encryption

making data unreadable by other humans or computersto stop them gaining access to its contents.
Discrimination based on gender, especially discrimination against women
improving networking, remote access
The way that the data collected by an organisation is reported, and who it is shared with.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

characteristics of firewalls

packet filters,
acceptable use policy, code of conduct,
This involves physically destroying the media so that it can no longer be used, might be final step after wiping
acceptable use policy, code of conduct,

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?