Itgs - Strand 1 -Test

Description

hl itgs 2016 2017 Quiz on Itgs - Strand 1 -Test, created by san wis on 22/04/2016.
san wis
Quiz by san wis, updated more than 1 year ago
san wis
Created by san wis over 8 years ago
405
1

Resource summary

Question 1

Answer
  • Reliability

Question 2

Question
Add the correct term:
Answer
  • Integrity

Question 3

Question
Select the correct option
Answer
  • Reliabilty
  • Securty
  • Privacy
  • Anominity

Question 4

Question
Select the correct answer
Answer
  • Privacy
  • Anonimity
  • Securtiy
  • Reliability
  • Authentication

Question 5

Question
Select the correct item
Answer
  • Reliability
  • Authenticity
  • Privacy
  • Anominity
  • Security

Question 6

Question
Select the correct item
Answer
  • Integrity
  • Relibability
  • Securtiy
  • Privacy
  • Anominity

Question 7

Question
Add the correct item
Answer
  • Privacy
  • Anominiity
  • Securtiy
  • Integrity
  • Reliability

Question 8

Question
Add the correct term
Answer
  • Privacy
  • Reliability
  • Integrity
  • Securtiy
  • Anominity

Question 9

Question
Select the correct item
Answer
  • Privacy
  • Reliability
  • Anominity
  • Authenticity
  • Integrity

Question 10

Question
[blank_start]Privacy[blank_end] is related with more sophisticated technologies developed for data collection.
Answer
  • Privacy
  • Security
  • Anominity
  • Reliability

Question 11

Question
Encryption is related with [blank_start]scramble / encode[blank_end]
Answer
  • scramble / encode
  • hide /decode
  • decode
  • fix

Question 12

Question
Data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered is an example of [blank_start]integrity[blank_end]
Answer
  • integrity
  • Authenticity
  • Privacy
  • Anonimity

Question 13

Question
[blank_start]Physical Security[blank_end]: Protection from theft, fire, flood, dust and extremes of temperature. Important computers are placed in secure rooms, sometimes with devices such as biometric scanners, to limit physical access.
Answer
  • Physical Security
  • Password Security
  • Software security
  • Encryption
  • Backing up data

Question 14

Question
This means taking a copy of the data and keeping it in a different location in a secure place.
Answer
  • Encryption
  • Software security
  • Password Security
  • Backing up data

Question 15

Question
[blank_start]Encryption[blank_end] is a “key” is used to encode the data in such a way that the data cannot be viewed again without the key.
Answer
  • Encryption
  • Physical security
  • Backing up
  • Software security

Question 16

Question
Individuals and groups develop creative works such as books, music and art or compile information sources such as databases. These are products of the mind - intangable products not like land. In todays world wide legal environment the of these works are provided certain ownership rights.
Answer
  • is known as Intellectual property
  • is known as Encryption
  • is known as Reliability
  • is known as Securtiy ,measures

Question 17

Question
__________________ relates to copyright, patents, trademarks, trade secrets and certains designs and practices.
Answer
  • Anonimity
  • Intellectual Property
  • Securtiy
  • Integrity
  • Reliability

Question 18

Question
An example of breaking [blank_start]copyright laws[blank_end] is the case of the movie Downfall was released in 2004 and shows the final days of Hilter. There is one famous scene that has been appropriated by a number of peope to create Downfall Parodies, many of which have found there way onto YouTube - you are free to view these! But, the studio that owns the copyright for the film have challenged YouTube to remove the parodies as they break copyright law.
Answer
  • copyright laws
  • Privacy
  • Authenticity
  • Securtiy
  • Reliability

Question 19

Question
An important point is that copyright does not protect the ideas behind the expression of a work, ideas can only be protected by gaining a [blank_start]patient.[blank_end]
Answer
  • patient.
  • Intellectual property.
  • Key.
  • owner.

Question 20

Question
[blank_start]Malware[blank_end] refers to all categories of malicious software, and poses a threat to your smartphone just as it does to your computer. The term “malware” includes viruses, spyware, trojan horses, worms, and basically any other harmful software or program.
Answer
  • Malware
  • Software
  • Hardware
  • Security
  • Privacy

Question 21

Question
[blank_start]Junk mail[blank_end] is unwanted advertising that arrives in your postal mailbox along with the mail you really want or need.
Answer
  • Junk mail
  • E-mail
  • Direct marketing
  • Flyers

Question 22

Question
A person uses it to conceal his or her true identity in order to cyber-bully someone else is an example of [blank_start]anonimity.[blank_end]
Answer
  • anonimity.
  • privacy.
  • securtiy.
  • intellectual property.

Question 23

Question
The use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs is an example of [blank_start]authenticity.[blank_end]
Answer
  • authenticity.
  • privacy.
  • anominity.
  • intellectual property.
  • integrity.

Question 24

Question
Copyright, trademarks and patents exist to protect [blank_start]intellectual property[blank_end].
Answer
  • intellectual property
  • security
  • privacy.
  • integrity.
Show full summary Hide full summary

Similar

ITGS STRAND 1: Social and Ethical Significance Definitions
san wis
Business and Emploment itgs
san wis
Cloud Storage
kvromant
Social and Ethical Significance
erenyazici
Protocols
kvromant
Security
kvromant
Threats
kvromant
3.7 Databases
kenaioliva
Tipos de redes
Luz Mazariegos
The Benefits and Limitations of Game-based Learning
Jinnakitt Limjirakajorn
ITGS STRAND 1: Social and Ethical Significance Definitions
Avval Halani