SlideShare a Scribd company logo
IN- CLASS QUIZ
CHAPTER - 2
SECURING ACCESS
The security technique that regulates who or what
can view or use resources in a computing
environment is known as?
ANTI VIRUS SECURING ACCESS
VIRUS NONE OF THESE
CORRECT
WRONG
WRONG WRONG
How we can protect our computer data that no one
can use our computer?
ANTI VIRUS
BY CREATING PASSWORD
POWER OFF
NONE OF THESE
CORRECT
WRONG WRONG
WRONG
In how many ways we lock our screen manually on
a windows computer
2
3
1
4
CORRECT
WRONG
WRONG
WRONG
Steps to “turn off” the computer?
NONE OF THESE
START BUTTON>POWER
BUTTON>SHUT DOWN
POWER BUTTON>START
BUTTON>SHUT DOWN
SHUT DOWN>POWER
BUTTON>START BUTTON
CORRECT
WRONG
WRONG
WRONG
A mode in which a computer is turned off but saves
its state to resume when it is turned on again?
RESTART
HIBERNATE/SLEEP SHUT DOWN
POWER OFF
CORRECT
WRONG
WRONG
WRONG

More Related Content

Similar to AUTHENTION.pptx

Read this
Read thisRead this
Read this
Axmed Sadik
 
Smart Password
Smart PasswordSmart Password
Smart Password
paperpublications3
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Coupon chaser
Coupon chaserCoupon chaser
Coupon chaser
andreswright576
 
Effective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniques
ijtsrd
 
lesson2-safeandresponsibleuseofict-210806120854.pdf
lesson2-safeandresponsibleuseofict-210806120854.pdflesson2-safeandresponsibleuseofict-210806120854.pdf
lesson2-safeandresponsibleuseofict-210806120854.pdf
Debbie Rizza Daroy
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Benandro Palor
 
Presentation
PresentationPresentation
Presentation
HASSAN RAZA
 
Presentation
PresentationPresentation
Presentation
HASSAN RAZA
 
Presentation
PresentationPresentation
Presentation
HASSAN RAZA
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
NehaKumari203874
 
Fgkf 601-en-t-v1.0
Fgkf 601-en-t-v1.0Fgkf 601-en-t-v1.0
Fgkf 601-en-t-v1.0
Domotica daVinci
 

Similar to AUTHENTION.pptx (13)

Read this
Read thisRead this
Read this
 
Smart Password
Smart PasswordSmart Password
Smart Password
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Coupon chaser
Coupon chaserCoupon chaser
Coupon chaser
 
Effective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniques
 
lesson2-safeandresponsibleuseofict-210806120854.pdf
lesson2-safeandresponsibleuseofict-210806120854.pdflesson2-safeandresponsibleuseofict-210806120854.pdf
lesson2-safeandresponsibleuseofict-210806120854.pdf
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 
Fgkf 601-en-t-v1.0
Fgkf 601-en-t-v1.0Fgkf 601-en-t-v1.0
Fgkf 601-en-t-v1.0
 

More from MjMj96

REV PPT 1.pptx
REV PPT 1.pptxREV PPT 1.pptx
REV PPT 1.pptx
MjMj96
 
Econ initiative.pptx
Econ initiative.pptxEcon initiative.pptx
Econ initiative.pptx
MjMj96
 
ppt do does did.pptx
ppt do does did.pptxppt do does did.pptx
ppt do does did.pptx
MjMj96
 
Grade5(Test 2).pptx
Grade5(Test 2).pptxGrade5(Test 2).pptx
Grade5(Test 2).pptx
MjMj96
 
Grade 4-MT 1.pptx
Grade 4-MT 1.pptxGrade 4-MT 1.pptx
Grade 4-MT 1.pptx
MjMj96
 
7dc6db0dad5e4311a67b0d358983aeff.ppt
7dc6db0dad5e4311a67b0d358983aeff.ppt7dc6db0dad5e4311a67b0d358983aeff.ppt
7dc6db0dad5e4311a67b0d358983aeff.ppt
MjMj96
 
580798-introduction-to-economics.pptx
580798-introduction-to-economics.pptx580798-introduction-to-economics.pptx
580798-introduction-to-economics.pptx
MjMj96
 
MM2.pptx
MM2.pptxMM2.pptx
MM2.pptx
MjMj96
 
MM1.pptx
MM1.pptxMM1.pptx
MM1.pptx
MjMj96
 
Chap01.ppt
Chap01.pptChap01.ppt
Chap01.ppt
MjMj96
 
grade 5.pptx
grade 5.pptxgrade 5.pptx
grade 5.pptx
MjMj96
 
mm oppp.pptx
mm oppp.pptxmm oppp.pptx
mm oppp.pptx
MjMj96
 
orchids demo ppt.pptx
orchids demo ppt.pptxorchids demo ppt.pptx
orchids demo ppt.pptx
MjMj96
 

More from MjMj96 (13)

REV PPT 1.pptx
REV PPT 1.pptxREV PPT 1.pptx
REV PPT 1.pptx
 
Econ initiative.pptx
Econ initiative.pptxEcon initiative.pptx
Econ initiative.pptx
 
ppt do does did.pptx
ppt do does did.pptxppt do does did.pptx
ppt do does did.pptx
 
Grade5(Test 2).pptx
Grade5(Test 2).pptxGrade5(Test 2).pptx
Grade5(Test 2).pptx
 
Grade 4-MT 1.pptx
Grade 4-MT 1.pptxGrade 4-MT 1.pptx
Grade 4-MT 1.pptx
 
7dc6db0dad5e4311a67b0d358983aeff.ppt
7dc6db0dad5e4311a67b0d358983aeff.ppt7dc6db0dad5e4311a67b0d358983aeff.ppt
7dc6db0dad5e4311a67b0d358983aeff.ppt
 
580798-introduction-to-economics.pptx
580798-introduction-to-economics.pptx580798-introduction-to-economics.pptx
580798-introduction-to-economics.pptx
 
MM2.pptx
MM2.pptxMM2.pptx
MM2.pptx
 
MM1.pptx
MM1.pptxMM1.pptx
MM1.pptx
 
Chap01.ppt
Chap01.pptChap01.ppt
Chap01.ppt
 
grade 5.pptx
grade 5.pptxgrade 5.pptx
grade 5.pptx
 
mm oppp.pptx
mm oppp.pptxmm oppp.pptx
mm oppp.pptx
 
orchids demo ppt.pptx
orchids demo ppt.pptxorchids demo ppt.pptx
orchids demo ppt.pptx
 

Recently uploaded

LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 

Recently uploaded (20)

LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 

AUTHENTION.pptx

  • 1. IN- CLASS QUIZ CHAPTER - 2 SECURING ACCESS
  • 2. The security technique that regulates who or what can view or use resources in a computing environment is known as? ANTI VIRUS SECURING ACCESS VIRUS NONE OF THESE CORRECT WRONG WRONG WRONG
  • 3. How we can protect our computer data that no one can use our computer? ANTI VIRUS BY CREATING PASSWORD POWER OFF NONE OF THESE CORRECT WRONG WRONG WRONG
  • 4. In how many ways we lock our screen manually on a windows computer 2 3 1 4 CORRECT WRONG WRONG WRONG
  • 5. Steps to “turn off” the computer? NONE OF THESE START BUTTON>POWER BUTTON>SHUT DOWN POWER BUTTON>START BUTTON>SHUT DOWN SHUT DOWN>POWER BUTTON>START BUTTON CORRECT WRONG WRONG WRONG
  • 6. A mode in which a computer is turned off but saves its state to resume when it is turned on again? RESTART HIBERNATE/SLEEP SHUT DOWN POWER OFF CORRECT WRONG WRONG WRONG