A) contains abusive and threatening language B) encourages you to click on a link to a fraudulent website C) offers you products in which you may have no interest D) requests a payment for goods you have not received
A) reply, pointing out the error B) forward the email to a friend to check C) click on the link in the email to check if it’s genuine D) report it as a possible phishing scam
A) have a heading with a logo which appears genuine B) offer large sums of money C) appear to come from a friend D) address you by name
A) replying to the email B) pointing to the link without clicking C) clicking the link D) deleting the email
A) Copyright Law B) Health & Safety Law C) The Data Protection Act or GDPR D) The computer misuse act
A) forward the email to a friend B) delete the email C) reply to the email D) send some money
A) hacking B) virus attack C) copyright infringement D) data theft
A) all of the above B) being aware of different types of email C) never clicking on links that you are suspicious of D) using the spam filter
A) change data on someone else’s computer files without permission B) all of the above C) look at someone else’s computer files without permission with intent to commit further criminal offences D) look at someone else’s computer files without permission
A) sometimes steal passwords so they can access your online account B) are rarely able to steal your personal data C) will destroy your computer hardware D) can only steal one password at a time
A) making frequent backups B) never using computers in public spaces, like a library C) Choosing a strong password and changing it regularly D) only allowing your friends and family to know your passwords
A) cannot be removed from your computer B) will destroy your computer hardware C) can only be transmitted via email D) you may unintentionally transmit to other computers
A) a type of virus B) a software bug C) unwanted software installed without consent D) security software to detect viruses
A) Your browser alerts you it has blocked a pop-up window B) Your browser alerts you to update to a newer version C) You receive a fraudulent email D) Your homepage has changed unexpectedly
A) all of the above B) overwrite your files and corrupt your data C) steal important information from your computer D) use a lot of memory and slow down your computer
A) Viruses can completely destroy your computer B) Viruses cannot be spread via email C) Anti-virus software will always prevent a virus from attacking your computer D) It is easy to spot when your computer has a virus
A) You see a lot of pop up adverts even when you're offline B) Any of the above C) A new toolbar appears on your browser D) Your hard disk is working overtime but you're not doing anything
A) pen email attachments B) post personal details on social networking sites C) open emails from people you do not know D) Download music or software from illegal sites
A) use a foreign word that will not be in an English dictionary B) save all your passwords in a file on your computer in case you forget one C) use a combination of letters and numbers that mean something to you but no one else D) use something easy to remember like your pet’s name
A) none of the above B) you change them regularly C) they are atleast 8 characters long D) you can use different passwords for all your online accounts
A) softcatsears B) Justin123456 C) ASDFGHpoiuy D) JustinSmith
A) has to ask permission to keep your data on their computer B) must register with the Local Authority C) must register with the Information Comissioner D) must delete the data when you leave
A) Their address B) All of the above C) The amount they spent last year at the supermarket D) Their loyalty card number
A) The Criminal Misuse Act B) The Personal data Act C) The Health & Safety Act D) the General Data Protection Regulations
A) personal data held by an organisation must be protected from hackers B) all personal data must be encrypted C) only government organisations can hold personal data about you D) personal data must be updated at least once a year
A) they will be unable to get the data corrected B) they have a right to see what data the company holds about them C) they can correct the data themselves D) they can log on any time to find out what data is held about them
A) all of the above B) keep the data accurate and up to date C) allow people to see what data is held about them D) keep the data secure
A) the year that a particular pupil joined the school B) the number of pupils in school C) the average percentage a*-c grades at gcse gained by pupils last year D) the school's email address
A) a type of virus B) a type of input device C) software used to gather inofrmation about individuals D) illegal software used to steal passwords
A) seel the data to other organisatiosn B) none of the above C) sell the data for research purposes after removing data from which individuals can be identified D) keep the data forever
A) upload photosgraphghs of yourself that you would not want everyone to see B) enter your address C) enter any of the above D) enter personal details of your friends and families
A) provide wrist rests for the keyboard B) plan work at a computer so there are frequent breaks C) all of the above D) pay for glasses for employees who need them, if they spend a lot of time using a computer
A) provide cup holders B) provide flat screens C) provide tiltable screens D) all of the above
A) all of the above B) has atleast 10m of space per person C) has the screen above eye level D) has an adjustable chair which supports the lower back
A) the room should be well-lit, not too bright and dim B) the light should not reflect off your computer screen C) you should take regular breaks D) all of the above
A) using a computer in almost all of your lessons B) moving heavy computers about frequently C) sitting in the same position for too long D) Using a keyboard for several hours a day
A) at worst, have to pay a fine B) have their computer equipment confiscated C) at worst, face a prison sentence D) have their company closed down
A) reformat the hard drive B) none of the above C) empty the recycle bin D) delete all the files on your computer
A) It should be taken to a landfill site B) It should be incinerated to ensure that sensitive data is destroyed C) It should be taken to a recycling centre D) It should be taken apart and the outer casing recycled, the rest put in the bin
A) all of the above B) Recover emails that you have sent C) Reciver files that you have deleted from your hard drive D) Recover files even if you have reformatted your hard drive |