Grade 10 Information Technology chapter 5

Welcome to your Grade 10 Information Technology chapter 5

After carefully reading the following 30 questions, choose the correct answer.

1. 
What is the practice of defending information from unauthorized access, use, or modification?

2. 
Which term refers to controls put in place to provide confidentiality, integrity, and availability for all computer system components?

3. 
What is an unauthorized disclosure of data or unauthorized access to a computer system or program?

4. 
Which security concept is concerned with safeguarding people’s rights to manage their personal data?

5. 
What term describes an act or event that has the potential to cause failure of computer security?

6. 
What is the result of unauthorized modification of data or damage to a computer system?

7. 
What is a collection of settings and permissions specific to a user that determines what they can do on a computer?

8. 
Which strategy involves creating multiple copies of data to recover it in case of loss?

9. 
Which system forms a barrier between trusted and untrusted websites to prevent unauthorized access?

10. 
What should you do if you encounter illegal Internet content or suspect a computer crime?

11. 
Which term is commonly used to refer to Information Security?

12. 
In computer security, what does "denial of service" refer to?

13. 
Which of the following is NOT an element of computer security mentioned in the text?

14. 
What can hackers use to enter a computer system through security breaches?

15. 
What should be consulted if you need help with software installation or maintenance on your computer?

16. 
Which security concern deals with personal data rights and how information is utilized?

17. 
Which of the following is considered a component of a computer system requiring security?

18. 
What is one of the most important career paths today, according to the textbook?

19. 
What is an unauthorized modification of a program an example of?

20. 
What can be used to recover data if it is lost?

21. 
Which of the following is NOT a type of cybercrime according to the unit review?

22. 
What practice is specifically mentioned as defending information from unauthorized use?

23. 
Which of the following is a physical prevention strategy for computers?

24. 
What kind of websites does a firewall form a barrier between?

25. 
What can be used as an external storage location for data backups?

26. 
Which term is related to individuals' rights concerning their personal information?

27. 
What determines what a user can and cannot do on a shared computer?

28. 
Which security threat involves unauthorized modification of data?

29. 
What is the main reason for networking computers to be exposed to security risks?

30. 
Which term refers to the practice of defending information from unauthorized modification?

Leave a Reply