Chapter4-Grade8

Chapter4-Grade8

8th Grade

8 Qs

quiz-placeholder

Similar activities

Data Protection & Security (RB3- CH-8

Data Protection & Security (RB3- CH-8

6th - 8th Grade

10 Qs

Pretest 1 PDBMS

Pretest 1 PDBMS

1st - 10th Grade

12 Qs

Programming - Algorithms in Pseudocode & Flow Diagrams

Programming - Algorithms in Pseudocode & Flow Diagrams

1st - 12th Grade

10 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Cybercrime

Cybercrime

7th - 10th Grade

10 Qs

1.2.2 - Secondary Storage

1.2.2 - Secondary Storage

KG - University

13 Qs

Google Suite Skills

Google Suite Skills

5th - 8th Grade

12 Qs

Computer Hardware - Storage Devices

Computer Hardware - Storage Devices

2nd - 12th Grade

11 Qs

Chapter4-Grade8

Chapter4-Grade8

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Faiza Salman

Used 11+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________________ describes methods for ensuring that data stored on a computer system is protected against unauthorized access

Data Duplication

Hacking

Information Security.

None of the above.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

If files are sensitive or confidential, they need to be_________.

Deleted

Protected

Erased

All of the above.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A _________________ should be used to prevent unauthorized people accessing, viewing or editing the data.

person status

person's address

email address

password

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Passwords should also be changed regularly to prevent the possibility of misuse by unauthorized people.

True

False

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The permissions that are granted to a user, or to an application, to read, write and erase files in the computer is called ______________.

user name

access rights

password

None of the above

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ of files should be carried out on a regular basis; hourly, daily or weekly

stealing

Backing up

Hacking

Deleting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The back up storage should be removed from the site and stored in a theft proof, fireproofs and waterproof environment.

True

False

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

People should not be Security conscious of Information stored in portable appliances such as Laptops, PDA’S and Mobile phones

True

False