Unit 4 – Data and Privacy (fill in the blank)
Quiz-summary
0 of 5 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
Information
Unit 4 – Data and Privacy (fill in the blank)
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Unit 4 – Data and Privacy 0%
- 1
- 2
- 3
- 4
- 5
- Answered
- Review
-
Question 1 of 5
1. Question
1 pointsMaking illegal copies of software is called_____________________.
Correct
Incorrect
-
Question 2 of 5
2. Question
1 points____________________is is a general term for any type of information processing that can be represented mathematically.
Correct
Incorrect
-
Question 3 of 5
3. Question
1 points_______________ is the process of encoding data.
Correct
Incorrect
-
Question 4 of 5
4. Question
1 pointsWhen a key has less number of character than the text to encrypt, then repeating letters of the key is called________________.
Correct
Incorrect
-
Question 5 of 5
5. Question
1 points________________ is cyber attack to make machine or network resource unavailable for a user.
Correct
Incorrect