1.
Which of the following options is the best definition of 'data'?
Correct Answer
A. Data is anything in a form suitable for use with a COMPUTER
Explanation
The best definition of 'data' is anything in a form suitable for use with a computer. This means that data can be any information, such as words, numbers, images, or videos, that can be processed and stored on a computer system. It emphasizes that data is not limited to a specific device or technology, but rather refers to information that can be used and manipulated by a computer.
2.
What are the three main types of risks to a company for losing data ?
Correct Answer
B. Other People, pHysical Risks and Employees
Explanation
The three main types of risks to a company for losing data are other people, physical risks, and employees. Other people can include hackers or unauthorized individuals who may gain access to the company's data and cause data loss. Physical risks refer to events such as natural disasters, fires, or power outages that can damage the company's infrastructure and lead to data loss. Employees can also pose a risk if they accidentally delete or mishandle data, or intentionally misuse it. Therefore, it is crucial for companies to address these risks and implement appropriate security measures to protect their data.
3.
Which of the following are three types of data?
Correct Answer(s)
A. Customer details, payments and accounts
B. Customer details, payments and costs
Explanation
The correct answer is Customer details, payments and accounts, Customer details, payments and costs. These options include types of data that are commonly found in business and financial systems. Customer details refer to information about customers such as their names, contact information, and preferences. Payments refer to financial transactions made by customers, while accounts refer to records of financial activities and balances. Costs are also a type of data commonly tracked in business systems, representing expenses incurred in the operation of a business.
4.
Which of the following answers best describe the threat posed by employees?
Correct Answer(s)
B. Data theft and data damage
C. Data use and data copying
Explanation
The threat posed by employees includes the potential for data theft and data damage, as well as unauthorized data use and copying. Employees have access to sensitive information and can misuse it by stealing or damaging data. Additionally, they can also use and copy data without proper authorization, which can lead to security breaches and compromise the confidentiality and integrity of the data.
5.
Which one of the following is not a physical risk to data?
Correct Answer(s)
B. Fire, flood and computer backups
C. Fire, flood and computer hardware
Explanation
The correct answer is "Fire, flood and computer backups". Fire and flood are physical risks to data as they can damage or destroy physical hardware and storage devices. Computer theft is also a physical risk as it involves the physical removal of hardware. However, computer backups are not a physical risk as they are copies of data stored in a separate location, typically in digital form. While backups can be affected by physical risks if they are stored in the same location as the original data, the question does not specify this scenario.
6.
Why is it important that you bacup data?
Correct Answer
A. So that I can recover any data loss
Explanation
It is important to backup data in order to recover any loss of data. Backing up data ensures that in the event of a data loss, such as accidental deletion, hardware failure, or a cyber attack, the data can be restored and accessed again. This helps to prevent any significant loss of valuable information, documents, or media files, and allows for the continuity of operations without disruption.
7.
Which of the following best describes a 'Firewall'
Correct Answer
A. Hardware or software that checks for unauthorised access to a computer
Explanation
A firewall is a security measure implemented either through hardware or software that is designed to monitor and control incoming and outgoing network traffic. It acts as a barrier between a computer or network and the internet, checking for any unauthorized access attempts and blocking them. It helps to protect the computer or network from potential threats and ensures that only authorized access is allowed.
8.
What is recommended that you do every 5 minutes when working on a computer?
Correct Answer
D. Save your work
Explanation
It is recommended to save your work every 5 minutes when working on a computer to prevent any potential loss of data in case of unexpected events such as power outages, system crashes, or accidental closure of programs. Saving regularly ensures that the latest version of your work is protected and can be easily recovered if needed.