Frage 1
Frage 2
Frage
Add the correct term:
Frage 3
Frage
Select the correct option
Antworten
-
Reliabilty
-
Securty
-
Privacy
-
Anominity
Frage 4
Frage
Select the correct answer
Antworten
-
Privacy
-
Anonimity
-
Securtiy
-
Reliability
-
Authentication
Frage 5
Frage
Select the correct item
Antworten
-
Reliability
-
Authenticity
-
Privacy
-
Anominity
-
Security
Frage 6
Frage
Select the correct item
Antworten
-
Integrity
-
Relibability
-
Securtiy
-
Privacy
-
Anominity
Frage 7
Frage
Add the correct item
Antworten
-
Privacy
-
Anominiity
-
Securtiy
-
Integrity
-
Reliability
Frage 8
Frage
Add the correct term
Antworten
-
Privacy
-
Reliability
-
Integrity
-
Securtiy
-
Anominity
Frage 9
Frage
Select the correct item
Antworten
-
Privacy
-
Reliability
-
Anominity
-
Authenticity
-
Integrity
Frage 10
Frage
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Antworten
-
Privacy
-
Security
-
Anominity
-
Reliability
Frage 11
Frage
Encryption is related with [blank_start]scramble / encode[blank_end]
Antworten
-
scramble / encode
-
hide /decode
-
decode
-
fix
Frage 12
Frage
Data losing integrity are where information is
duplicated in a relational database and only one copy is updated or where data entries have been maliciously
altered is an example of [blank_start]integrity[blank_end]
Antworten
-
integrity
-
Authenticity
-
Privacy
-
Anonimity
Frage 13
Frage
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Antworten
-
Physical Security
-
Password Security
-
Software security
-
Encryption
-
Backing up data
Frage 14
Frage
This means taking a copy of the data and keeping it in a different location in a secure place.
Antworten
-
Encryption
-
Software security
-
Password Security
-
Backing up data
Frage 15
Frage
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Antworten
-
Encryption
-
Physical security
-
Backing up
-
Software security
Frage 16
Frage
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Frage 17
Frage
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Antworten
-
Anonimity
-
Intellectual Property
-
Securtiy
-
Integrity
-
Reliability
Frage 18
Frage
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Antworten
-
copyright laws
-
Privacy
-
Authenticity
-
Securtiy
-
Reliability
Frage 19
Frage
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Antworten
-
patient.
-
Intellectual property.
-
Key.
-
owner.
Frage 20
Frage
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Antworten
-
Malware
-
Software
-
Hardware
-
Security
-
Privacy
Frage 21
Frage
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Antworten
-
Junk mail
-
E-mail
-
Direct marketing
-
Flyers
Frage 22
Frage
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Antworten
-
anonimity.
-
privacy.
-
securtiy.
-
intellectual property.
Frage 23
Frage
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Antworten
-
authenticity.
-
privacy.
-
anominity.
-
intellectual property.
-
integrity.
Frage 24
Frage
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Antworten
-
intellectual property
-
security
-
privacy.
-
integrity.