IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3.

Slides:



Advertisements
Similar presentations
Life Satisfaction in Past, Present, and Future
Advertisements

1 C Programming. 2 Operators 3 Operators in C An operator is a symbol that tells the computer to perform certain mathematical or logical manipulation.
Structure Ss will be able to understand the purpose of Grandad employing an online passage of suggestions. 1.Can the second part be left out? 2.Why.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Introduction to Relational Database Systems 1 Lecture 4.
Using Information at the University University Secretarys Office
Discovering Computers 2010
Unit Test Practice Number Sense Part I START.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Number Sense Unit Test Practice Q1: What is the absolute value of -10? a) b) a) b)
The Office Procedures and Technology
Chapter 7: Physical & Environmental Security
Test on Input, Output, Processing, & Storage Devices
Why Dont You Ask Your Teacher? Diane Price, ACU Community Languages ConferenceJuly Why Dont You Ask Your Teacher?
Checking & Corrective Action
Design of Questionnaire for teachers FocusNo. of Qs (A) General Feedback 3Q12 Q8 Q13 (B) Teaching & Learning Style 2Q11 Q10 (C) Language Development 4141.
IPM THEORY CHALLENGE QUIZ NUMBER 1. Q1 - We are able to place organisations into which of the following categories based on their prime purpose A.Profit.
IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 2.
EN0129 Week 1 PC Quiz1 Week 1 PC Quiz EN0129 PC and Network Technology - 1.
Probability Models The Bernoulli Family. Bernoulli Trials Geometric Geom(p) Mean stdev How long till first success Binomial Bion(n, p) Mean Stdev r successes.
1 A DMINISTRATION of E MPLOYEE N EEDS. 2 Lecture Outline  Differentiate between the different types of leave generally available in Australian companies.
Software Homework questions.
Addition 1’s to 20.
25 seconds left…...
Item 3 Formula Review. Formula Review Consultation Simplification Mainstreaming grants Balance of SEN/AEN/Deprivation and impact of Pupil Premium.
Unit Test Practice Expressions & Equations Part 1 Unit Part 1 Unit.
Conversion Unit Q1: Write the fraction as a percent. 16/20 a) c) b)d) 64% 8% 80% 20%
Unit Test Practice Expressions & Equations Part II.
Unit Test Practice Statistics Unit Q1: Find the mean. 6, 9, 2, 4, 3, 6, 5  a) c)  b)d)
Week 1.
Systems Development Project Management Chapter Extension 15.
Lab 15 :BCD Counters and Frequency Division:
POSSIBLE THREATS TO DATA
Welcome to the VSE version of “Who Wants to be a Millionaire” game, where quality knowledge is wealth. This game plays the same as the TV version. A question.
Cambridge Avenue Medical Centre GP Patient Survey 2013.
Powered by Online Weekly Circular Ad Survey 10/29/14 Monday, November 24, 2014.
Q1. Anne has €3, her mother pays her €4 for tidying the bedroom. Her dad says he will double everything she saves. If she saves her total money how.
DEALING WITH FEELINGS. Dealing with feelings Q1 At what age can you become a volunteer? SAMARITANS QUIZ Q3 How else might callers contact Samaritans?
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
The laws Organizations are covered by lots of different laws
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Security and Ethics Privacy Employment Health Crime Working
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Privacy in the Workplace Roland Hassall, Partner Date: 12 November 2015.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
8 – Protecting Data and Security
Security of People, Property and Information
G061 - Network Security.
Presentation transcript:

IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q1 – Which of the following is not one of the four Acts that influence the way organisations collect, store, and dispose of their data and information. A.Health Records Act 2001 B.Privacy Act 1988 C.Information Privacy Act 2000 D.Copyright Act 1968

Q2 – The Privacy Act 1988 affects which organisations A.Private sector business B.Commonwealth public sector departments and agencies C.Private sector business with an annual turnover of > $3 million D.Public sector in Victoria

Q3 – The Health Records Act 2001 affects … A.All Victorian organisations that deal with medical records B.Victorian public sector organisations regardless of size C.All Australian private and public sector organisations regardless of size D.All of the above

Q4 – The Privacy Amendment (Private Sector) Act 2000 affects … A.All Australian organisations in the private sector regardless of size B.Only those organisations dealing with sensitive health records C.All Victorian organisations that deal with public information D.Private sector organisation with an annual turnover of >$3 million

Q5 – Which of the following is not a key feature of the Health Records Act 2001? A.It covers both private and public medical sectors B.It was designed to enable organisations to gain easy access to medical records when needed C.Individuals can access their own medical information D.Individuals are able to view their records to correct mistakes

Q6 – Which of the following Acts deals with intellectual property A.Health Records Act 2001 B.Copyright Act 1968 C.Information Privacy Act 2000 D.None of the above

Q7 – Employers monitoring staff use of would be considered a.. A.A breach of the Copyright Act 1968 B.An ethical workplace issue C.A breach of the Information Privacy Act 2000 D.Good idea

Q8 – Formatting a disk that contained important files would be considered A.A physical threat to information B.An ethical issue affecting information C.An accidental or deliberate threat to information D.An act that could get you sacked

Q9 – Joe works for a company called ProAct. While at work he designs a database for the company to store information using Microsoft Access. Who owns the rights to this database? A.Joe B.ProAct C.The Copyright Act doesn’t cover this situation D.Microsoft

Q10 - Which of the following statements is incorrect? A.Organisations must try to keep accurate, complete and up-to date information B.Organisations cannot give out information to a third party without approval C.Organisations must inform employees if they are under surveillance D.Organisations are able to use information gathered for any purpose

Q11 – Who of the following is allowed to access your medical records A.Your boss to check if you are really sick B.Any person working in the medical profession C.You D.Your parents as your legal guardians

Q12 – Hard disks are most useful for storing information online because A.They are very fast and have high capacity B.They will never crash if your careful C.Everyone can access all the files when they want to D.None of the above

Q13 – Physical security includes A.Locking doors and windows B.Firewalls C.Desktop monitoring systems D.All of the above

Q14 – Which of the following is not a biometric security device.. A.Fingerprint matching B.A person’s iris patterns C.Smart cards D.Voice recognition

Q15 – A criteria for evaluating the effectiveness of file management strategies is A.Ease of retrieval B.The size of the file C.Whether different programs can read the file D.Whether the file extension is visible in windows explorer or not

Q16 – Which of the following is not a key area for evaluating file management strategies A.Integrity of data B.Folder and File sizes C.Ease of retrieval D.Security

Q17 – Which of the following is not a software based security measure A.Surveillance camera B.Audit trail and monitoring C.Encryption D.Firewall

Q18 – The difference between a differential backup and an incremental backup is.. A.There is no real difference. The real difference is whether you do a full back up or not B.Differential backups only partially back up your data C.Incremental backups keep increasing the data storage D.None of the above.

Q19 – which of the following is not part of a disaster recovery plan.. A.Emergency plan B.Test plan C.Backup plan D.All of the above

Q20 – The most popular software based barrier to prevent unauthorised access is A.Antivirus software B.passwords C.Encyrption D.Surveillance cameras

ANSWERS 1.D 2.B 3.A 4.D 5.B 6.B 7.B 8.C 9.B 10.D 11.C 12.A 13.A 14.C 15.A 16.B 17.A 18.D 19.D 20.B