Question 1
Question 2
Question
Add the correct term:
Question 3
Question
Select the correct option
Answer
-
Reliabilty
-
Securty
-
Privacy
-
Anominity
Question 4
Question
Select the correct answer
Answer
-
Privacy
-
Anonimity
-
Securtiy
-
Reliability
-
Authentication
Question 5
Question
Select the correct item
Answer
-
Reliability
-
Authenticity
-
Privacy
-
Anominity
-
Security
Question 6
Question
Select the correct item
Answer
-
Integrity
-
Relibability
-
Securtiy
-
Privacy
-
Anominity
Question 7
Question
Add the correct item
Answer
-
Privacy
-
Anominiity
-
Securtiy
-
Integrity
-
Reliability
Question 8
Question
Add the correct term
Answer
-
Privacy
-
Reliability
-
Integrity
-
Securtiy
-
Anominity
Question 9
Question
Select the correct item
Answer
-
Privacy
-
Reliability
-
Anominity
-
Authenticity
-
Integrity
Question 10
Question
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Answer
-
Privacy
-
Security
-
Anominity
-
Reliability
Question 11
Question
Encryption is related with [blank_start]scramble / encode[blank_end]
Answer
-
scramble / encode
-
hide /decode
-
decode
-
fix
Question 12
Question
Data losing integrity are where information is
duplicated in a relational database and only one copy is updated or where data entries have been maliciously
altered is an example of [blank_start]integrity[blank_end]
Answer
-
integrity
-
Authenticity
-
Privacy
-
Anonimity
Question 13
Question
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Answer
-
Physical Security
-
Password Security
-
Software security
-
Encryption
-
Backing up data
Question 14
Question
This means taking a copy of the data and keeping it in a different location in a secure place.
Answer
-
Encryption
-
Software security
-
Password Security
-
Backing up data
Question 15
Question
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Answer
-
Encryption
-
Physical security
-
Backing up
-
Software security
Question 16
Question
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Question 17
Question
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Answer
-
Anonimity
-
Intellectual Property
-
Securtiy
-
Integrity
-
Reliability
Question 18
Question
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Answer
-
copyright laws
-
Privacy
-
Authenticity
-
Securtiy
-
Reliability
Question 19
Question
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Answer
-
patient.
-
Intellectual property.
-
Key.
-
owner.
Question 20
Question
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Answer
-
Malware
-
Software
-
Hardware
-
Security
-
Privacy
Question 21
Question
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Answer
-
Junk mail
-
E-mail
-
Direct marketing
-
Flyers
Question 22
Question
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Answer
-
anonimity.
-
privacy.
-
securtiy.
-
intellectual property.
Question 23
Question
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Answer
-
authenticity.
-
privacy.
-
anominity.
-
intellectual property.
-
integrity.
Question 24
Question
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Answer
-
intellectual property
-
security
-
privacy.
-
integrity.