Itgs - Strand 1 -Test

Beschreibung

hl itgs 2016 2017 Quiz am Itgs - Strand 1 -Test, erstellt von san wis am 22/04/2016.
san wis
Quiz von san wis, aktualisiert more than 1 year ago
san wis
Erstellt von san wis vor mehr als 8 Jahre
402
1

Zusammenfassung der Ressource

Frage 1

Antworten
  • Reliability

Frage 2

Frage
Add the correct term:
Antworten
  • Integrity

Frage 3

Frage
Select the correct option
Antworten
  • Reliabilty
  • Securty
  • Privacy
  • Anominity

Frage 4

Frage
Select the correct answer
Antworten
  • Privacy
  • Anonimity
  • Securtiy
  • Reliability
  • Authentication

Frage 5

Frage
Select the correct item
Antworten
  • Reliability
  • Authenticity
  • Privacy
  • Anominity
  • Security

Frage 6

Frage
Select the correct item
Antworten
  • Integrity
  • Relibability
  • Securtiy
  • Privacy
  • Anominity

Frage 7

Frage
Add the correct item
Antworten
  • Privacy
  • Anominiity
  • Securtiy
  • Integrity
  • Reliability

Frage 8

Frage
Add the correct term
Antworten
  • Privacy
  • Reliability
  • Integrity
  • Securtiy
  • Anominity

Frage 9

Frage
Select the correct item
Antworten
  • Privacy
  • Reliability
  • Anominity
  • Authenticity
  • Integrity

Frage 10

Frage
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Antworten
  • Privacy
  • Security
  • Anominity
  • Reliability

Frage 11

Frage
Encryption is related with [blank_start]scramble / encode[blank_end]
Antworten
  • scramble / encode
  • hide /decode
  • decode
  • fix

Frage 12

Frage
Data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered is an example of [blank_start]integrity[blank_end]
Antworten
  • integrity
  • Authenticity
  • Privacy
  • Anonimity

Frage 13

Frage
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Antworten
  • Physical Security
  • Password Security
  • Software security
  • Encryption
  • Backing up data

Frage 14

Frage
This means taking a copy of the data and keeping it in a different location in a secure place.
Antworten
  • Encryption
  • Software security
  • Password Security
  • Backing up data

Frage 15

Frage
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Antworten
  • Encryption
  • Physical security
  • Backing up
  • Software security

Frage 16

Frage
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Antworten
  • is known as Intellectual property
  • is known as Encryption
  • is known as Reliability
  • is known as Securtiy ,measures

Frage 17

Frage
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Antworten
  • Anonimity
  • Intellectual Property
  • Securtiy
  • Integrity
  • Reliability

Frage 18

Frage
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Antworten
  • copyright laws
  • Privacy
  • Authenticity
  • Securtiy
  • Reliability

Frage 19

Frage
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Antworten
  • patient.
  • Intellectual property.
  • Key.
  • owner.

Frage 20

Frage
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Antworten
  • Malware
  • Software
  • Hardware
  • Security
  • Privacy

Frage 21

Frage
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Antworten
  • Junk mail
  • E-mail
  • Direct marketing
  • Flyers

Frage 22

Frage
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Antworten
  • anonimity.
  • privacy.
  • securtiy.
  • intellectual property.

Frage 23

Frage
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Antworten
  • authenticity.
  • privacy.
  • anominity.
  • intellectual property.
  • integrity.

Frage 24

Frage
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Antworten
  • intellectual property
  • security
  • privacy.
  • integrity.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

ITGS STRAND 1: Social and Ethical Significance Definitions
san wis
Business and Emploment itgs
san wis
Cloud Storage
kvromant
Social and Ethical Significance
erenyazici
Protocols
kvromant
Security
kvromant
Threats
kvromant
3.7 Databases
kenaioliva
Tipos de redes
Luz Mazariegos
The Benefits and Limitations of Game-based Learning
Jinnakitt Limjirakajorn
ITGS STRAND 1: Social and Ethical Significance Definitions
Avval Halani