Itgs - Strand 1 -Test

Descrição

hl itgs 2016 2017 Quiz sobre Itgs - Strand 1 -Test, criado por san wis em 22-04-2016.
san wis
Quiz por san wis, atualizado more than 1 year ago
san wis
Criado por san wis mais de 8 anos atrás
405
1

Resumo de Recurso

Questão 1

Responda
  • Reliability

Questão 2

Questão
Add the correct term:
Responda
  • Integrity

Questão 3

Questão
Select the correct option
Responda
  • Reliabilty
  • Securty
  • Privacy
  • Anominity

Questão 4

Questão
Select the correct answer
Responda
  • Privacy
  • Anonimity
  • Securtiy
  • Reliability
  • Authentication

Questão 5

Questão
Select the correct item
Responda
  • Reliability
  • Authenticity
  • Privacy
  • Anominity
  • Security

Questão 6

Questão
Select the correct item
Responda
  • Integrity
  • Relibability
  • Securtiy
  • Privacy
  • Anominity

Questão 7

Questão
Add the correct item
Responda
  • Privacy
  • Anominiity
  • Securtiy
  • Integrity
  • Reliability

Questão 8

Questão
Add the correct term
Responda
  • Privacy
  • Reliability
  • Integrity
  • Securtiy
  • Anominity

Questão 9

Questão
Select the correct item
Responda
  • Privacy
  • Reliability
  • Anominity
  • Authenticity
  • Integrity

Questão 10

Questão
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Responda
  • Privacy
  • Security
  • Anominity
  • Reliability

Questão 11

Questão
Encryption is related with [blank_start]scramble / encode[blank_end]
Responda
  • scramble / encode
  • hide /decode
  • decode
  • fix

Questão 12

Questão
Data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered is an example of [blank_start]integrity[blank_end]
Responda
  • integrity
  • Authenticity
  • Privacy
  • Anonimity

Questão 13

Questão
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Responda
  • Physical Security
  • Password Security
  • Software security
  • Encryption
  • Backing up data

Questão 14

Questão
This means taking a copy of the data and keeping it in a different location in a secure place.
Responda
  • Encryption
  • Software security
  • Password Security
  • Backing up data

Questão 15

Questão
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Responda
  • Encryption
  • Physical security
  • Backing up
  • Software security

Questão 16

Questão
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Responda
  • is known as Intellectual property
  • is known as Encryption
  • is known as Reliability
  • is known as Securtiy ,measures

Questão 17

Questão
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Responda
  • Anonimity
  • Intellectual Property
  • Securtiy
  • Integrity
  • Reliability

Questão 18

Questão
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Responda
  • copyright laws
  • Privacy
  • Authenticity
  • Securtiy
  • Reliability

Questão 19

Questão
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Responda
  • patient.
  • Intellectual property.
  • Key.
  • owner.

Questão 20

Questão
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Responda
  • Malware
  • Software
  • Hardware
  • Security
  • Privacy

Questão 21

Questão
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Responda
  • Junk mail
  • E-mail
  • Direct marketing
  • Flyers

Questão 22

Questão
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Responda
  • anonimity.
  • privacy.
  • securtiy.
  • intellectual property.

Questão 23

Questão
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Responda
  • authenticity.
  • privacy.
  • anominity.
  • intellectual property.
  • integrity.

Questão 24

Questão
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Responda
  • intellectual property
  • security
  • privacy.
  • integrity.

Semelhante

ITGS STRAND 1: Social and Ethical Significance Definitions
san wis
Business and Emploment itgs
san wis
Cloud Storage
kvromant
Social and Ethical Significance
erenyazici
Protocols
kvromant
Security
kvromant
Threats
kvromant
3.7 Databases
kenaioliva
Tipos de redes
Luz Mazariegos
The Benefits and Limitations of Game-based Learning
Jinnakitt Limjirakajorn
ITGS STRAND 1: Social and Ethical Significance Definitions
Avval Halani