Questão 1
Questão 2
Questão
Add the correct term:
Questão 3
Questão
Select the correct option
Responda
-
Reliabilty
-
Securty
-
Privacy
-
Anominity
Questão 4
Questão
Select the correct answer
Responda
-
Privacy
-
Anonimity
-
Securtiy
-
Reliability
-
Authentication
Questão 5
Questão
Select the correct item
Responda
-
Reliability
-
Authenticity
-
Privacy
-
Anominity
-
Security
Questão 6
Questão
Select the correct item
Responda
-
Integrity
-
Relibability
-
Securtiy
-
Privacy
-
Anominity
Questão 7
Questão
Add the correct item
Responda
-
Privacy
-
Anominiity
-
Securtiy
-
Integrity
-
Reliability
Questão 8
Questão
Add the correct term
Responda
-
Privacy
-
Reliability
-
Integrity
-
Securtiy
-
Anominity
Questão 9
Questão
Select the correct item
Responda
-
Privacy
-
Reliability
-
Anominity
-
Authenticity
-
Integrity
Questão 10
Questão
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Responda
-
Privacy
-
Security
-
Anominity
-
Reliability
Questão 11
Questão
Encryption is related with [blank_start]scramble / encode[blank_end]
Responda
-
scramble / encode
-
hide /decode
-
decode
-
fix
Questão 12
Questão
Data losing integrity are where information is
duplicated in a relational database and only one copy is updated or where data entries have been maliciously
altered is an example of [blank_start]integrity[blank_end]
Responda
-
integrity
-
Authenticity
-
Privacy
-
Anonimity
Questão 13
Questão
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Responda
-
Physical Security
-
Password Security
-
Software security
-
Encryption
-
Backing up data
Questão 14
Questão
This means taking a copy of the data and keeping it in a different location in a secure place.
Responda
-
Encryption
-
Software security
-
Password Security
-
Backing up data
Questão 15
Questão
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Responda
-
Encryption
-
Physical security
-
Backing up
-
Software security
Questão 16
Questão
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Questão 17
Questão
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Responda
-
Anonimity
-
Intellectual Property
-
Securtiy
-
Integrity
-
Reliability
Questão 18
Questão
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Responda
-
copyright laws
-
Privacy
-
Authenticity
-
Securtiy
-
Reliability
Questão 19
Questão
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Responda
-
patient.
-
Intellectual property.
-
Key.
-
owner.
Questão 20
Questão
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Responda
-
Malware
-
Software
-
Hardware
-
Security
-
Privacy
Questão 21
Questão
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Responda
-
Junk mail
-
E-mail
-
Direct marketing
-
Flyers
Questão 22
Questão
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Responda
-
anonimity.
-
privacy.
-
securtiy.
-
intellectual property.
Questão 23
Questão
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Responda
-
authenticity.
-
privacy.
-
anominity.
-
intellectual property.
-
integrity.
Questão 24
Questão
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Responda
-
intellectual property
-
security
-
privacy.
-
integrity.