красотканаргизаа

красотканаргизаа

University

60 Qs

quiz-placeholder

Similar activities

ALC Book 22 (Units 1 to 2)

ALC Book 22 (Units 1 to 2)

12th Grade - Professional Development

58 Qs

Cutting Edge Pre-Intermediate Units 5 - 8

Cutting Edge Pre-Intermediate Units 5 - 8

12th Grade - Professional Development

60 Qs

BUSINESS PLACEMENT TEST

BUSINESS PLACEMENT TEST

University

60 Qs

at the airport

at the airport

University

60 Qs

Review_U3-4_2Partial

Review_U3-4_2Partial

University

60 Qs

xxxReady for IELTS 2nd ed. Unit 08 Reading: Vocabulary

xxxReady for IELTS 2nd ed. Unit 08 Reading: Vocabulary

12th Grade - Professional Development

56 Qs

English B1+ Review quiz

English B1+ Review quiz

12th Grade - University

62 Qs

M3 Final Exam

M3 Final Exam

4th Grade - University

60 Qs

красотканаргизаа

красотканаргизаа

Assessment

Quiz

English

University

Medium

Created by

Наргиза Кайырбекова

Used 98+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is the name of a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

 Spyware

 Firewall

 Virus

 Norton

 intrusion detection  

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Encryption information is…:

A conversion process in which information is deleted.

The process of its transformation, in which the content of information is changed to a false

The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects

The process of converting information into machine code

Identification protocol

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Software information protection

cryptography

uninterrupted power supply unit

backup

data duplication

Desepticons invasion

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Ensuring the accuracy and completeness of information and methods of its processing.

Confidentiality

Integrity 

Availability

Feasibility

Dr. Web

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 Providing access to information only to authorized users?

Privacy

integrity

Availability

Feasibility

Dr. Web

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 The greatest threat to network security pose

opening standard user account

opening of the standard account administrator group

copying files that have been changed during the day, without a backup mark

main menu

unauthorized access, electronic eavesdropping and intentional or unintentional damage

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

 What is Information Security?

PC security measures

the security of personal information

Identification protocol

Measures to protect information from unauthorized access

Software update

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?