A) requests a payment for goods you have not received B) offers you products in which you may have no interest C) contains abusive and threatening language D) encourages you to click on a link to a fraudulent website
A) forward the email to a friend to check B) click on the link in the email to check if it’s genuine C) reply, pointing out the error D) report it as a possible phishing scam
A) appear to come from a friend B) offer large sums of money C) address you by name D) have a heading with a logo which appears genuine
A) pointing to the link without clicking B) replying to the email C) deleting the email D) clicking the link
A) Health & Safety Law B) Copyright Law C) The Data Protection Act or GDPR D) The computer misuse act
A) reply to the email B) send some money C) delete the email D) forward the email to a friend
A) virus attack B) copyright infringement C) hacking D) data theft
A) using the spam filter B) being aware of different types of email C) all of the above D) never clicking on links that you are suspicious of
A) all of the above B) look at someone else’s computer files without permission with intent to commit further criminal offences C) look at someone else’s computer files without permission D) change data on someone else’s computer files without permission
A) can only steal one password at a time B) will destroy your computer hardware C) are rarely able to steal your personal data D) sometimes steal passwords so they can access your online account
A) only allowing your friends and family to know your passwords B) making frequent backups C) never using computers in public spaces, like a library D) Choosing a strong password and changing it regularly
A) can only be transmitted via email B) will destroy your computer hardware C) cannot be removed from your computer D) you may unintentionally transmit to other computers
A) a software bug B) security software to detect viruses C) a type of virus D) unwanted software installed without consent
A) Your browser alerts you to update to a newer version B) Your browser alerts you it has blocked a pop-up window C) Your homepage has changed unexpectedly D) You receive a fraudulent email
A) steal important information from your computer B) use a lot of memory and slow down your computer C) overwrite your files and corrupt your data D) all of the above
A) It is easy to spot when your computer has a virus B) Viruses can completely destroy your computer C) Viruses cannot be spread via email D) Anti-virus software will always prevent a virus from attacking your computer
A) Your hard disk is working overtime but you're not doing anything B) Any of the above C) You see a lot of pop up adverts even when you're offline D) A new toolbar appears on your browser
A) pen email attachments B) post personal details on social networking sites C) Download music or software from illegal sites D) open emails from people you do not know
A) use a combination of letters and numbers that mean something to you but no one else B) use a foreign word that will not be in an English dictionary C) save all your passwords in a file on your computer in case you forget one D) use something easy to remember like your pet’s name
A) none of the above B) you change them regularly C) they are atleast 8 characters long D) you can use different passwords for all your online accounts
A) ASDFGHpoiuy B) Justin123456 C) JustinSmith D) softcatsears
A) must register with the Information Comissioner B) has to ask permission to keep your data on their computer C) must delete the data when you leave D) must register with the Local Authority
A) Their address B) Their loyalty card number C) All of the above D) The amount they spent last year at the supermarket
A) The Health & Safety Act B) the General Data Protection Regulations C) The Criminal Misuse Act D) The Personal data Act
A) all personal data must be encrypted B) personal data must be updated at least once a year C) only government organisations can hold personal data about you D) personal data held by an organisation must be protected from hackers
A) they have a right to see what data the company holds about them B) they will be unable to get the data corrected C) they can log on any time to find out what data is held about them D) they can correct the data themselves
A) keep the data secure B) allow people to see what data is held about them C) all of the above D) keep the data accurate and up to date
A) the school's email address B) the year that a particular pupil joined the school C) the average percentage a*-c grades at gcse gained by pupils last year D) the number of pupils in school
A) software used to gather inofrmation about individuals B) a type of virus C) a type of input device D) illegal software used to steal passwords
A) keep the data forever B) none of the above C) seel the data to other organisatiosn D) sell the data for research purposes after removing data from which individuals can be identified
A) enter personal details of your friends and families B) enter any of the above C) enter your address D) upload photosgraphghs of yourself that you would not want everyone to see
A) plan work at a computer so there are frequent breaks B) pay for glasses for employees who need them, if they spend a lot of time using a computer C) all of the above D) provide wrist rests for the keyboard
A) all of the above B) provide flat screens C) provide tiltable screens D) provide cup holders
A) has an adjustable chair which supports the lower back B) has atleast 10m of space per person C) all of the above D) has the screen above eye level
A) the room should be well-lit, not too bright and dim B) the light should not reflect off your computer screen C) you should take regular breaks D) all of the above
A) Using a keyboard for several hours a day B) using a computer in almost all of your lessons C) moving heavy computers about frequently D) sitting in the same position for too long
A) have their company closed down B) have their computer equipment confiscated C) at worst, face a prison sentence D) at worst, have to pay a fine
A) empty the recycle bin B) delete all the files on your computer C) reformat the hard drive D) none of the above
A) It should be incinerated to ensure that sensitive data is destroyed B) It should be taken to a recycling centre C) It should be taken to a landfill site D) It should be taken apart and the outer casing recycled, the rest put in the bin
A) Recover emails that you have sent B) Recover files even if you have reformatted your hard drive C) all of the above D) Reciver files that you have deleted from your hard drive |