Pregunta 1
Pregunta 2
Pregunta
Add the correct term:
Pregunta 3
Pregunta
Select the correct option
Respuesta
-
Reliabilty
-
Securty
-
Privacy
-
Anominity
Pregunta 4
Pregunta
Select the correct answer
Respuesta
-
Privacy
-
Anonimity
-
Securtiy
-
Reliability
-
Authentication
Pregunta 5
Pregunta
Select the correct item
Respuesta
-
Reliability
-
Authenticity
-
Privacy
-
Anominity
-
Security
Pregunta 6
Pregunta
Select the correct item
Respuesta
-
Integrity
-
Relibability
-
Securtiy
-
Privacy
-
Anominity
Pregunta 7
Pregunta
Add the correct item
Respuesta
-
Privacy
-
Anominiity
-
Securtiy
-
Integrity
-
Reliability
Pregunta 8
Pregunta
Add the correct term
Respuesta
-
Privacy
-
Reliability
-
Integrity
-
Securtiy
-
Anominity
Pregunta 9
Pregunta
Select the correct item
Respuesta
-
Privacy
-
Reliability
-
Anominity
-
Authenticity
-
Integrity
Pregunta 10
Pregunta
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Respuesta
-
Privacy
-
Security
-
Anominity
-
Reliability
Pregunta 11
Pregunta
Encryption is related with [blank_start]scramble / encode[blank_end]
Respuesta
-
scramble / encode
-
hide /decode
-
decode
-
fix
Pregunta 12
Pregunta
Data losing integrity are where information is
duplicated in a relational database and only one copy is updated or where data entries have been maliciously
altered is an example of [blank_start]integrity[blank_end]
Respuesta
-
integrity
-
Authenticity
-
Privacy
-
Anonimity
Pregunta 13
Pregunta
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Respuesta
-
Physical Security
-
Password Security
-
Software security
-
Encryption
-
Backing up data
Pregunta 14
Pregunta
This means taking a copy of the data and keeping it in a different location in a secure place.
Respuesta
-
Encryption
-
Software security
-
Password Security
-
Backing up data
Pregunta 15
Pregunta
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Respuesta
-
Encryption
-
Physical security
-
Backing up
-
Software security
Pregunta 16
Pregunta
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Pregunta 17
Pregunta
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Respuesta
-
Anonimity
-
Intellectual Property
-
Securtiy
-
Integrity
-
Reliability
Pregunta 18
Pregunta
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Respuesta
-
copyright laws
-
Privacy
-
Authenticity
-
Securtiy
-
Reliability
Pregunta 19
Pregunta
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Respuesta
-
patient.
-
Intellectual property.
-
Key.
-
owner.
Pregunta 20
Pregunta
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Respuesta
-
Malware
-
Software
-
Hardware
-
Security
-
Privacy
Pregunta 21
Pregunta
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Respuesta
-
Junk mail
-
E-mail
-
Direct marketing
-
Flyers
Pregunta 22
Pregunta
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Respuesta
-
anonimity.
-
privacy.
-
securtiy.
-
intellectual property.
Pregunta 23
Pregunta
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Respuesta
-
authenticity.
-
privacy.
-
anominity.
-
intellectual property.
-
integrity.
Pregunta 24
Pregunta
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Respuesta
-
intellectual property
-
security
-
privacy.
-
integrity.