Security Mcqs
Security Mcqs
Security Mcqs
1. All of the following are examples of real security and privacy risks
EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
6. Which of the following is NOT one of the four major data processing
functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
13. The name for the way that computers manipulate data into
information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to
____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed
appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B