5.5 Digital Security

5.5 Digital Security

12th Grade

15 Qs

quiz-placeholder

Similar activities

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

10th - 12th Grade

20 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

RPMS - IPCRF by Jenelou John Israel

RPMS - IPCRF by Jenelou John Israel

12th Grade

10 Qs

ICT Service Solutions 2

ICT Service Solutions 2

8th - 12th Grade

17 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

ASPEK LEGAL TIK XII

ASPEK LEGAL TIK XII

12th Grade

20 Qs

5.5 Digital Security

5.5 Digital Security

Assessment

Quiz

Computers

12th Grade

Easy

Used 62+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

description of digital security
the protection of a computer's internet account and files from intrusion by an outside user
the management of change and development within a business or similar organization.
a monitor filtersthat decrease the viewing angle of a monitor, preventing it from being viewed from the side;
prejudice for or against one person or group, especially in a way considered to be unfair.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

description of firewalls
a network security system designed to prevent unauthorized access to or from a private network
Discrimination based on gender, especially discrimination against women
The way that the data collected by an organisation is reported, and who it is shared with.
change in busines practice, legislation, competition

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

list of digital security
AV software, firewalls, anti-spyware, pemissions, encryption, username/password
potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage.
can be insufficient to hide data, need to repaeat several times
degausser has vry strong magnet or electromagntic coil, can damage disk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

characteristics of anti-spyware
controliing surfing habits, adware, tracking cookies
destroy hard drive with a hammer, fire, strong magnet, or crushing
making changes to the network ot make it work more effeciently
prejudice for or against one person or group, especially in a way considered to be unfair.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

characteristics of permissions
groups of users get similar access
groups of users get similar access
gain unauthorized access to data in a system or computer
ability to get access to a computer or a network from a remote distance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

description of encryption
making data unreadable by other humans or computersto stop them gaining access to its contents.
Discrimination based on gender, especially discrimination against women
improving networking, remote access
The way that the data collected by an organisation is reported, and who it is shared with.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

characteristics of firewalls
packet filters,
acceptable use policy, code of conduct,
This involves physically destroying the media so that it can no longer be used, might be final step after wiping
acceptable use policy, code of conduct,

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?