Itgs - Strand 1 -Test

Descripción

hl itgs 2016 2017 Test sobre Itgs - Strand 1 -Test, creado por san wis el 22/04/2016.
san wis
Test por san wis, actualizado hace más de 1 año
san wis
Creado por san wis hace más de 8 años
404
1

Resumen del Recurso

Pregunta 1

Respuesta
  • Reliability

Pregunta 2

Pregunta
Add the correct term:
Respuesta
  • Integrity

Pregunta 3

Pregunta
Select the correct option
Respuesta
  • Reliabilty
  • Securty
  • Privacy
  • Anominity

Pregunta 4

Pregunta
Select the correct answer
Respuesta
  • Privacy
  • Anonimity
  • Securtiy
  • Reliability
  • Authentication

Pregunta 5

Pregunta
Select the correct item
Respuesta
  • Reliability
  • Authenticity
  • Privacy
  • Anominity
  • Security

Pregunta 6

Pregunta
Select the correct item
Respuesta
  • Integrity
  • Relibability
  • Securtiy
  • Privacy
  • Anominity

Pregunta 7

Pregunta
Add the correct item
Respuesta
  • Privacy
  • Anominiity
  • Securtiy
  • Integrity
  • Reliability

Pregunta 8

Pregunta
Add the correct term
Respuesta
  • Privacy
  • Reliability
  • Integrity
  • Securtiy
  • Anominity

Pregunta 9

Pregunta
Select the correct item
Respuesta
  • Privacy
  • Reliability
  • Anominity
  • Authenticity
  • Integrity

Pregunta 10

Pregunta
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Respuesta
  • Privacy
  • Security
  • Anominity
  • Reliability

Pregunta 11

Pregunta
Encryption is related with [blank_start]scramble / encode[blank_end]
Respuesta
  • scramble / encode
  • hide /decode
  • decode
  • fix

Pregunta 12

Pregunta
Data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered is an example of [blank_start]integrity[blank_end]
Respuesta
  • integrity
  • Authenticity
  • Privacy
  • Anonimity

Pregunta 13

Pregunta
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Respuesta
  • Physical Security
  • Password Security
  • Software security
  • Encryption
  • Backing up data

Pregunta 14

Pregunta
This means taking a copy of the data and keeping it in a different location in a secure place.
Respuesta
  • Encryption
  • Software security
  • Password Security
  • Backing up data

Pregunta 15

Pregunta
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Respuesta
  • Encryption
  • Physical security
  • Backing up
  • Software security

Pregunta 16

Pregunta
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Respuesta
  • is known as Intellectual property
  • is known as Encryption
  • is known as Reliability
  • is known as Securtiy ,measures

Pregunta 17

Pregunta
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Respuesta
  • Anonimity
  • Intellectual Property
  • Securtiy
  • Integrity
  • Reliability

Pregunta 18

Pregunta
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Respuesta
  • copyright laws
  • Privacy
  • Authenticity
  • Securtiy
  • Reliability

Pregunta 19

Pregunta
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Respuesta
  • patient.
  • Intellectual property.
  • Key.
  • owner.

Pregunta 20

Pregunta
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Respuesta
  • Malware
  • Software
  • Hardware
  • Security
  • Privacy

Pregunta 21

Pregunta
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Respuesta
  • Junk mail
  • E-mail
  • Direct marketing
  • Flyers

Pregunta 22

Pregunta
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Respuesta
  • anonimity.
  • privacy.
  • securtiy.
  • intellectual property.

Pregunta 23

Pregunta
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Respuesta
  • authenticity.
  • privacy.
  • anominity.
  • intellectual property.
  • integrity.

Pregunta 24

Pregunta
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Respuesta
  • intellectual property
  • security
  • privacy.
  • integrity.
Mostrar resumen completo Ocultar resumen completo

Similar

ITGS STRAND 1: Social and Ethical Significance Definitions
san wis
Business and Emploment itgs
san wis
Cloud Storage
kvromant
Social and Ethical Significance
erenyazici
Protocols
kvromant
Security
kvromant
Threats
kvromant
3.7 Databases
kenaioliva
Tipos de redes
Luz Mazariegos
The Benefits and Limitations of Game-based Learning
Jinnakitt Limjirakajorn
ITGS STRAND 1: Social and Ethical Significance Definitions
Avval Halani