Presentation is loading. Please wait.

Presentation is loading. Please wait.


Similar presentations

Presentation on theme: "IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3."— Presentation transcript:


2 Q1 – Which of the following is not one of the four Acts that influence the way organisations collect, store, and dispose of their data and information. A.Health Records Act 2001 B.Privacy Act 1988 C.Information Privacy Act 2000 D.Copyright Act 1968

3 Q2 – The Privacy Act 1988 affects which organisations A.Private sector business B.Commonwealth public sector departments and agencies C.Private sector business with an annual turnover of > $3 million D.Public sector in Victoria

4 Q3 – The Health Records Act 2001 affects … A.All Victorian organisations that deal with medical records B.Victorian public sector organisations regardless of size C.All Australian private and public sector organisations regardless of size D.All of the above

5 Q4 – The Privacy Amendment (Private Sector) Act 2000 affects … A.All Australian organisations in the private sector regardless of size B.Only those organisations dealing with sensitive health records C.All Victorian organisations that deal with public information D.Private sector organisation with an annual turnover of >$3 million

6 Q5 – Which of the following is not a key feature of the Health Records Act 2001? A.It covers both private and public medical sectors B.It was designed to enable organisations to gain easy access to medical records when needed C.Individuals can access their own medical information D.Individuals are able to view their records to correct mistakes

7 Q6 – Which of the following Acts deals with intellectual property A.Health Records Act 2001 B.Copyright Act 1968 C.Information Privacy Act 2000 D.None of the above

8 Q7 – Employers monitoring staff use of email would be considered a.. A.A breach of the Copyright Act 1968 B.An ethical workplace issue C.A breach of the Information Privacy Act 2000 D.Good idea

9 Q8 – Formatting a disk that contained important files would be considered A.A physical threat to information B.An ethical issue affecting information C.An accidental or deliberate threat to information D.An act that could get you sacked

10 Q9 – Joe works for a company called ProAct. While at work he designs a database for the company to store information using Microsoft Access. Who owns the rights to this database? A.Joe B.ProAct C.The Copyright Act doesn’t cover this situation D.Microsoft

11 Q10 - Which of the following statements is incorrect? A.Organisations must try to keep accurate, complete and up-to date information B.Organisations cannot give out information to a third party without approval C.Organisations must inform employees if they are under surveillance D.Organisations are able to use information gathered for any purpose

12 Q11 – Who of the following is allowed to access your medical records A.Your boss to check if you are really sick B.Any person working in the medical profession C.You D.Your parents as your legal guardians

13 Q12 – Hard disks are most useful for storing information online because A.They are very fast and have high capacity B.They will never crash if your careful C.Everyone can access all the files when they want to D.None of the above

14 Q13 – Physical security includes A.Locking doors and windows B.Firewalls C.Desktop monitoring systems D.All of the above

15 Q14 – Which of the following is not a biometric security device.. A.Fingerprint matching B.A person’s iris patterns C.Smart cards D.Voice recognition

16 Q15 – A criteria for evaluating the effectiveness of file management strategies is A.Ease of retrieval B.The size of the file C.Whether different programs can read the file D.Whether the file extension is visible in windows explorer or not

17 Q16 – Which of the following is not a key area for evaluating file management strategies A.Integrity of data B.Folder and File sizes C.Ease of retrieval D.Security

18 Q17 – Which of the following is not a software based security measure A.Surveillance camera B.Audit trail and monitoring C.Encryption D.Firewall

19 Q18 – The difference between a differential backup and an incremental backup is.. A.There is no real difference. The real difference is whether you do a full back up or not B.Differential backups only partially back up your data C.Incremental backups keep increasing the data storage D.None of the above.

20 Q19 – which of the following is not part of a disaster recovery plan.. A.Emergency plan B.Test plan C.Backup plan D.All of the above

21 Q20 – The most popular software based barrier to prevent unauthorised access is A.Antivirus software B.passwords C.Encyrption D.Surveillance cameras

22 ANSWERS 1.D 2.B 3.A 4.D 5.B 6.B 7.B 8.C 9.B 10.D 11.C 12.A 13.A 14.C 15.A 16.B 17.A 18.D 19.D 20.B

Download ppt "IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3."

Similar presentations

Ads by Google