ThatQuiz Test Library Take this test now
Year 8 Computer Crime Assessment Spring 1 2019
Contributed by: Ayub
  • 1. A phishing email is one which:
A) contains abusive and threatening language
B) requests a payment for goods you have not received
C) encourages you to click on a link to a fraudulent website
D) offers you products in which you may have no interest
  • 2. if you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:
A) click on the link in the email to check if it’s genuine
B) forward the email to a friend to check
C) report it as a possible phishing scam
D) reply, pointing out the error
  • 3. A fraudulent email which is trying to obtain your username and password for a particular site will typically:
A) appear to come from a friend
B) have a heading with a logo which appears genuine
C) address you by name
D) offer large sums of money
  • 4. You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
A) pointing to the link without clicking
B) clicking the link
C) replying to the email
D) deleting the email
  • 5. Hacking is illegal under:
A) Copyright Law
B) The computer misuse act
C) The Data Protection Act or GDPR
D) Health & Safety Law
  • 6. You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:
A) forward the email to a friend
B) delete the email
C) reply to the email
D) send some money
  • 7. Gaining unauthorised access to someone else’s computer files is known as:
A) copyright infringement
B) virus attack
C) data theft
D) hacking
  • 8. You can protect yourself against spam or fraudulent emails by:
A) being aware of different types of email
B) never clicking on links that you are suspicious of
C) all of the above
D) using the spam filter
  • 9. Under the Computer Misuse Act, it is illegal to:
A) look at someone else’s computer files without permission
B) change data on someone else’s computer files without permission
C) look at someone else’s computer files without permission with intent to commit further criminal offences
D) all of the above
  • 10. Hackers:
A) are rarely able to steal your personal data
B) will destroy your computer hardware
C) sometimes steal passwords so they can access your online account
D) can only steal one password at a time
  • 11. You can protect your files from unauthorised access by:
A) making frequent backups
B) never using computers in public spaces, like a library
C) only allowing your friends and family to know your passwords
D) Choosing a strong password and changing it regularly
  • 12. A computer virus is a small program which:
A) cannot be removed from your computer
B) will destroy your computer hardware
C) you may unintentionally transmit to other computers
D) can only be transmitted via email
  • 13. "Malware” is:
A) security software to detect viruses
B) a software bug
C) a type of virus
D) unwanted software installed without consent
  • 14. Which of these is a sign of malware on your computer?
A) You receive a fraudulent email
B) Your homepage has changed unexpectedly
C) Your browser alerts you it has blocked a pop-up window
D) Your browser alerts you to update to a newer version
  • 15. A computer virus may:
A) use a lot of memory and slow down your computer
B) overwrite your files and corrupt your data
C) steal important information from your computer
D) all of the above
  • 16. Which of the following is true?
A) It is easy to spot when your computer has a virus
B) Anti-virus software will always prevent a virus from attacking your computer
C) Viruses cannot be spread via email
D) Viruses can completely destroy your computer
  • 17. Which of the following is a sign of a possible malware attack?
A) Any of the above
B) You see a lot of pop up adverts even when you're offline
C) Your hard disk is working overtime but you're not doing anything
D) A new toolbar appears on your browser
  • 18. To avoid your computer being infected by malware, you should not:
A) post personal details on social networking sites
B) open emails from people you do not know
C) Download music or software from illegal sites
D) pen email attachments
  • 19. When choosing a password you should:
A) use something easy to remember like your pet’s name
B) use a foreign word that will not be in an English dictionary
C) save all your passwords in a file on your computer in case you forget one
D) use a combination of letters and numbers that mean something to you but no one else
  • 20. You can be confident your passwords are completely secure if:
A) you change them regularly
B) you can use different passwords for all your online accounts
C) they are atleast 8 characters long
D) none of the above
  • 21. Which of the following is a “strong” password for someone named Justin Smith?
A) ASDFGHpoiuy
B) JustinSmith
C) Justin123456
D) softcatsears
  • 22. An organisation such as a school holds personal data about you. The organisation:
A) must register with the Information Comissioner
B) must delete the data when you leave
C) has to ask permission to keep your data on their computer
D) must register with the Local Authority
  • 23. Which of the following is “personal data” which may be held about someone on the computer system of a supermarket?
A) Their address
B) The amount they spent last year at the supermarket
C) All of the above
D) Their loyalty card number
  • 24. The Act which specifies the rules about collecting and holding personal data is called:
A) The Criminal Misuse Act
B) The Health & Safety Act
C) The Personal data Act
D) the General Data Protection Regulations
  • 25. The law states that
A) only government organisations can hold personal data about you
B) all personal data must be encrypted
C) personal data held by an organisation must be protected from hackers
D) personal data must be updated at least once a year
  • 26. If someone suspects that a company holds inaccurate information about them:
A) they will be unable to get the data corrected
B) they have a right to see what data the company holds about them
C) they can log on any time to find out what data is held about them
D) they can correct the data themselves
  • 27. The law regarding holding personal data states that if a company holds personal data it must:
A) all of the above
B) keep the data accurate and up to date
C) allow people to see what data is held about them
D) keep the data secure
  • 28. Which of the following data is considered to be “personal data” when held by a school:
A) the number of pupils in school
B) the average percentage a*-c grades at gcse gained by pupils last year
C) the school's email address
D) the year that a particular pupil joined the school
  • 29. A "data harvesting tool" is:
A) a type of input device
B) software used to gather inofrmation about individuals
C) illegal software used to steal passwords
D) a type of virus
  • 30. Organisations holding personal data are allowed to:
A) sell the data for research purposes after removing data from which individuals can be identified
B) seel the data to other organisatiosn
C) none of the above
D) keep the data forever
  • 31. When you enter personal details on social networking sites you should never:
A) upload photosgraphghs of yourself that you would not want everyone to see
B) enter any of the above
C) enter personal details of your friends and families
D) enter your address
  • 32. Health and Safety regulations require an employer to:
A) pay for glasses for employees who need them, if they spend a lot of time using a computer
B) plan work at a computer so there are frequent breaks
C) provide wrist rests for the keyboard
D) all of the above
  • 33. Health and Safety regulations require an employer to:
A) provide flat screens
B) all of the above
C) provide tiltable screens
D) provide cup holders
  • 34. A well-designed workstation:
A) all of the above
B) has an adjustable chair which supports the lower back
C) has atleast 10m of space per person
D) has the screen above eye level
  • 35. To reduce the danger of eyestrain from using a computer:
A) the light should not reflect off your computer screen
B) all of the above
C) the room should be well-lit, not too bright and dim
D) you should take regular breaks
  • 36. RSI (Repetitive Strain Injury) can be caused by:
A) sitting in the same position for too long
B) Using a keyboard for several hours a day
C) moving heavy computers about frequently
D) using a computer in almost all of your lessons
  • 37. Employers who ignore Health and Safety rules regarding computer use may:
A) have their company closed down
B) at worst, face a prison sentence
C) at worst, have to pay a fine
D) have their computer equipment confiscated
  • 38. When disposing of an old computer, to protect your personal information it is sufficient to:
A) none of the above
B) empty the recycle bin
C) delete all the files on your computer
D) reformat the hard drive
  • 39. When disposing of an old computer:
A) It should be taken to a landfill site
B) It should be incinerated to ensure that sensitive data is destroyed
C) It should be taken apart and the outer casing recycled, the rest put in the bin
D) It should be taken to a recycling centre
  • 40. A data recovery program can:
A) all of the above
B) Recover files even if you have reformatted your hard drive
C) Recover emails that you have sent
D) Reciver files that you have deleted from your hard drive
Students who took this test also took :

Created with That Quiz — the site for test creation and grading in math and other subjects.