A) offers you products in which you may have no interest B) contains abusive and threatening language C) requests a payment for goods you have not received D) encourages you to click on a link to a fraudulent website
A) click on the link in the email to check if it’s genuine B) report it as a possible phishing scam C) forward the email to a friend to check D) reply, pointing out the error
A) offer large sums of money B) have a heading with a logo which appears genuine C) address you by name D) appear to come from a friend
A) clicking the link B) deleting the email C) replying to the email D) pointing to the link without clicking
A) The computer misuse act B) The Data Protection Act or GDPR C) Health & Safety Law D) Copyright Law
A) delete the email B) reply to the email C) send some money D) forward the email to a friend
A) hacking B) copyright infringement C) data theft D) virus attack
A) never clicking on links that you are suspicious of B) using the spam filter C) being aware of different types of email D) all of the above
A) look at someone else’s computer files without permission B) look at someone else’s computer files without permission with intent to commit further criminal offences C) change data on someone else’s computer files without permission D) all of the above
A) can only steal one password at a time B) sometimes steal passwords so they can access your online account C) are rarely able to steal your personal data D) will destroy your computer hardware
A) never using computers in public spaces, like a library B) making frequent backups C) Choosing a strong password and changing it regularly D) only allowing your friends and family to know your passwords
A) you may unintentionally transmit to other computers B) can only be transmitted via email C) will destroy your computer hardware D) cannot be removed from your computer
A) security software to detect viruses B) unwanted software installed without consent C) a type of virus D) a software bug
A) Your homepage has changed unexpectedly B) You receive a fraudulent email C) Your browser alerts you it has blocked a pop-up window D) Your browser alerts you to update to a newer version
A) steal important information from your computer B) use a lot of memory and slow down your computer C) overwrite your files and corrupt your data D) all of the above
A) It is easy to spot when your computer has a virus B) Anti-virus software will always prevent a virus from attacking your computer C) Viruses cannot be spread via email D) Viruses can completely destroy your computer
A) You see a lot of pop up adverts even when you're offline B) A new toolbar appears on your browser C) Your hard disk is working overtime but you're not doing anything D) Any of the above
A) post personal details on social networking sites B) Download music or software from illegal sites C) open emails from people you do not know D) pen email attachments
A) use a foreign word that will not be in an English dictionary B) use something easy to remember like your pet’s name C) use a combination of letters and numbers that mean something to you but no one else D) save all your passwords in a file on your computer in case you forget one
A) you can use different passwords for all your online accounts B) you change them regularly C) none of the above D) they are atleast 8 characters long
A) Justin123456 B) JustinSmith C) softcatsears D) ASDFGHpoiuy
A) must delete the data when you leave B) has to ask permission to keep your data on their computer C) must register with the Local Authority D) must register with the Information Comissioner
A) All of the above B) Their loyalty card number C) Their address D) The amount they spent last year at the supermarket
A) The Criminal Misuse Act B) The Health & Safety Act C) the General Data Protection Regulations D) The Personal data Act
A) personal data must be updated at least once a year B) personal data held by an organisation must be protected from hackers C) all personal data must be encrypted D) only government organisations can hold personal data about you
A) they will be unable to get the data corrected B) they can log on any time to find out what data is held about them C) they have a right to see what data the company holds about them D) they can correct the data themselves
A) keep the data accurate and up to date B) allow people to see what data is held about them C) keep the data secure D) all of the above
A) the year that a particular pupil joined the school B) the average percentage a*-c grades at gcse gained by pupils last year C) the number of pupils in school D) the school's email address
A) illegal software used to steal passwords B) a type of input device C) software used to gather inofrmation about individuals D) a type of virus
A) sell the data for research purposes after removing data from which individuals can be identified B) keep the data forever C) none of the above D) seel the data to other organisatiosn
A) enter any of the above B) upload photosgraphghs of yourself that you would not want everyone to see C) enter personal details of your friends and families D) enter your address
A) all of the above B) provide wrist rests for the keyboard C) plan work at a computer so there are frequent breaks D) pay for glasses for employees who need them, if they spend a lot of time using a computer
A) provide flat screens B) all of the above C) provide cup holders D) provide tiltable screens
A) has an adjustable chair which supports the lower back B) has the screen above eye level C) has atleast 10m of space per person D) all of the above
A) the light should not reflect off your computer screen B) you should take regular breaks C) all of the above D) the room should be well-lit, not too bright and dim
A) using a computer in almost all of your lessons B) moving heavy computers about frequently C) Using a keyboard for several hours a day D) sitting in the same position for too long
A) have their computer equipment confiscated B) at worst, have to pay a fine C) at worst, face a prison sentence D) have their company closed down
A) reformat the hard drive B) delete all the files on your computer C) none of the above D) empty the recycle bin
A) It should be taken to a landfill site B) It should be taken to a recycling centre C) It should be taken apart and the outer casing recycled, the rest put in the bin D) It should be incinerated to ensure that sensitive data is destroyed
A) Recover files even if you have reformatted your hard drive B) all of the above C) Recover emails that you have sent D) Reciver files that you have deleted from your hard drive |