Technology and security

Technology and security

12th Grade

20 Qs

quiz-placeholder

Similar activities

Web Ethics & E-Issues (Vocabulary)

Web Ethics & E-Issues (Vocabulary)

12th Grade

18 Qs

Market Research

Market Research

9th - 12th Grade

22 Qs

KUIS UAS

KUIS UAS

1st Grade - University

15 Qs

CTEC 2.1.5-6

CTEC 2.1.5-6

12th Grade

15 Qs

Cybersecurity, Crime and Data Mini (IB Business Management U5.9)

Cybersecurity, Crime and Data Mini (IB Business Management U5.9)

12th Grade

20 Qs

Cybersecurity and Networking Quiz

Cybersecurity and Networking Quiz

12th Grade

15 Qs

Vocabulary - Google Sheets

Vocabulary - Google Sheets

9th - 12th Grade

18 Qs

Discretionary Expenses Vocab

Discretionary Expenses Vocab

11th - 12th Grade

20 Qs

Technology and security

Technology and security

Assessment

Quiz

Business

12th Grade

Medium

Created by

Patrick AdjeiTutu

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Automating processes in a cloud accounting package means data entry will always be accurate.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access to real time data enables an organisation to more easily take advantage of offshore outsourcing

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Third party apps and plug ins can represent an increased security risk.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Breaches of data protection are taken seriously and carry heavy penalties of up to__, %

£16.5million, 4% of turnover

£17.5million, 4% of turnover

£17million, 4% of turnover

£17million, 5% of turnover

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This entity shall be responsible for, and be able to demonstrate compliance with the data principles

Data processor

Data subject

Data controller

Cyber Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify what is being described here. ‘A digital ledger of transactions that is shared across the entire network of computers.’ Select one option

Data analytics

Blockchain

Machine learning

Artificial intelligence

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When fraudulent communications that appear to come from legitimate sources try to steal information, spread viruses or ransomware is called?

Pharming

Malware

Smishing

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?