A) encourages you to click on a link to a fraudulent website B) offers you products in which you may have no interest C) requests a payment for goods you have not received D) contains abusive and threatening language
A) forward the email to a friend to check B) click on the link in the email to check if it’s genuine C) reply, pointing out the error D) report it as a possible phishing scam
A) appear to come from a friend B) offer large sums of money C) address you by name D) have a heading with a logo which appears genuine
A) replying to the email B) clicking the link C) deleting the email D) pointing to the link without clicking
A) Copyright Law B) The computer misuse act C) The Data Protection Act or GDPR D) Health & Safety Law
A) delete the email B) forward the email to a friend C) send some money D) reply to the email
A) copyright infringement B) data theft C) hacking D) virus attack
A) being aware of different types of email B) never clicking on links that you are suspicious of C) using the spam filter D) all of the above
A) change data on someone else’s computer files without permission B) look at someone else’s computer files without permission with intent to commit further criminal offences C) look at someone else’s computer files without permission D) all of the above
A) sometimes steal passwords so they can access your online account B) will destroy your computer hardware C) can only steal one password at a time D) are rarely able to steal your personal data
A) Choosing a strong password and changing it regularly B) only allowing your friends and family to know your passwords C) never using computers in public spaces, like a library D) making frequent backups
A) you may unintentionally transmit to other computers B) will destroy your computer hardware C) cannot be removed from your computer D) can only be transmitted via email
A) security software to detect viruses B) a type of virus C) unwanted software installed without consent D) a software bug
A) You receive a fraudulent email B) Your browser alerts you it has blocked a pop-up window C) Your browser alerts you to update to a newer version D) Your homepage has changed unexpectedly
A) all of the above B) steal important information from your computer C) use a lot of memory and slow down your computer D) overwrite your files and corrupt your data
A) Anti-virus software will always prevent a virus from attacking your computer B) It is easy to spot when your computer has a virus C) Viruses cannot be spread via email D) Viruses can completely destroy your computer
A) A new toolbar appears on your browser B) Any of the above C) Your hard disk is working overtime but you're not doing anything D) You see a lot of pop up adverts even when you're offline
A) post personal details on social networking sites B) Download music or software from illegal sites C) pen email attachments D) open emails from people you do not know
A) use something easy to remember like your pet’s name B) save all your passwords in a file on your computer in case you forget one C) use a combination of letters and numbers that mean something to you but no one else D) use a foreign word that will not be in an English dictionary
A) you change them regularly B) they are atleast 8 characters long C) none of the above D) you can use different passwords for all your online accounts
A) softcatsears B) JustinSmith C) Justin123456 D) ASDFGHpoiuy
A) has to ask permission to keep your data on their computer B) must register with the Information Comissioner C) must register with the Local Authority D) must delete the data when you leave
A) The amount they spent last year at the supermarket B) Their address C) Their loyalty card number D) All of the above
A) The Personal data Act B) The Health & Safety Act C) the General Data Protection Regulations D) The Criminal Misuse Act
A) only government organisations can hold personal data about you B) all personal data must be encrypted C) personal data held by an organisation must be protected from hackers D) personal data must be updated at least once a year
A) they have a right to see what data the company holds about them B) they will be unable to get the data corrected C) they can log on any time to find out what data is held about them D) they can correct the data themselves
A) all of the above B) keep the data secure C) allow people to see what data is held about them D) keep the data accurate and up to date
A) the number of pupils in school B) the average percentage a*-c grades at gcse gained by pupils last year C) the school's email address D) the year that a particular pupil joined the school
A) a type of virus B) illegal software used to steal passwords C) a type of input device D) software used to gather inofrmation about individuals
A) keep the data forever B) seel the data to other organisatiosn C) none of the above D) sell the data for research purposes after removing data from which individuals can be identified
A) enter your address B) upload photosgraphghs of yourself that you would not want everyone to see C) enter personal details of your friends and families D) enter any of the above
A) pay for glasses for employees who need them, if they spend a lot of time using a computer B) provide wrist rests for the keyboard C) plan work at a computer so there are frequent breaks D) all of the above
A) all of the above B) provide cup holders C) provide tiltable screens D) provide flat screens
A) has atleast 10m of space per person B) has an adjustable chair which supports the lower back C) all of the above D) has the screen above eye level
A) all of the above B) the room should be well-lit, not too bright and dim C) the light should not reflect off your computer screen D) you should take regular breaks
A) sitting in the same position for too long B) moving heavy computers about frequently C) using a computer in almost all of your lessons D) Using a keyboard for several hours a day
A) have their computer equipment confiscated B) at worst, face a prison sentence C) have their company closed down D) at worst, have to pay a fine
A) none of the above B) empty the recycle bin C) reformat the hard drive D) delete all the files on your computer
A) It should be taken to a recycling centre B) It should be incinerated to ensure that sensitive data is destroyed C) It should be taken apart and the outer casing recycled, the rest put in the bin D) It should be taken to a landfill site
A) Recover files even if you have reformatted your hard drive B) Recover emails that you have sent C) Reciver files that you have deleted from your hard drive D) all of the above |