A) requests a payment for goods you have not received B) offers you products in which you may have no interest C) encourages you to click on a link to a fraudulent website D) contains abusive and threatening language
A) forward the email to a friend to check B) reply, pointing out the error C) click on the link in the email to check if it’s genuine D) report it as a possible phishing scam
A) have a heading with a logo which appears genuine B) address you by name C) offer large sums of money D) appear to come from a friend
A) pointing to the link without clicking B) clicking the link C) replying to the email D) deleting the email
A) Health & Safety Law B) The Data Protection Act or GDPR C) Copyright Law D) The computer misuse act
A) forward the email to a friend B) delete the email C) send some money D) reply to the email
A) hacking B) data theft C) virus attack D) copyright infringement
A) all of the above B) never clicking on links that you are suspicious of C) being aware of different types of email D) using the spam filter
A) change data on someone else’s computer files without permission B) all of the above C) look at someone else’s computer files without permission D) look at someone else’s computer files without permission with intent to commit further criminal offences
A) sometimes steal passwords so they can access your online account B) will destroy your computer hardware C) are rarely able to steal your personal data D) can only steal one password at a time
A) making frequent backups B) Choosing a strong password and changing it regularly C) never using computers in public spaces, like a library D) only allowing your friends and family to know your passwords
A) will destroy your computer hardware B) you may unintentionally transmit to other computers C) can only be transmitted via email D) cannot be removed from your computer
A) a type of virus B) security software to detect viruses C) unwanted software installed without consent D) a software bug
A) Your homepage has changed unexpectedly B) Your browser alerts you to update to a newer version C) Your browser alerts you it has blocked a pop-up window D) You receive a fraudulent email
A) overwrite your files and corrupt your data B) all of the above C) use a lot of memory and slow down your computer D) steal important information from your computer
A) Anti-virus software will always prevent a virus from attacking your computer B) Viruses cannot be spread via email C) It is easy to spot when your computer has a virus D) Viruses can completely destroy your computer
A) Your hard disk is working overtime but you're not doing anything B) Any of the above C) You see a lot of pop up adverts even when you're offline D) A new toolbar appears on your browser
A) open emails from people you do not know B) post personal details on social networking sites C) Download music or software from illegal sites D) pen email attachments
A) save all your passwords in a file on your computer in case you forget one B) use something easy to remember like your pet’s name C) use a foreign word that will not be in an English dictionary D) use a combination of letters and numbers that mean something to you but no one else
A) none of the above B) they are atleast 8 characters long C) you change them regularly D) you can use different passwords for all your online accounts
A) Justin123456 B) softcatsears C) ASDFGHpoiuy D) JustinSmith
A) must register with the Local Authority B) must register with the Information Comissioner C) has to ask permission to keep your data on their computer D) must delete the data when you leave
A) Their loyalty card number B) Their address C) The amount they spent last year at the supermarket D) All of the above
A) the General Data Protection Regulations B) The Criminal Misuse Act C) The Health & Safety Act D) The Personal data Act
A) all personal data must be encrypted B) personal data must be updated at least once a year C) only government organisations can hold personal data about you D) personal data held by an organisation must be protected from hackers
A) they can correct the data themselves B) they can log on any time to find out what data is held about them C) they have a right to see what data the company holds about them D) they will be unable to get the data corrected
A) all of the above B) keep the data secure C) keep the data accurate and up to date D) allow people to see what data is held about them
A) the year that a particular pupil joined the school B) the school's email address C) the average percentage a*-c grades at gcse gained by pupils last year D) the number of pupils in school
A) a type of virus B) illegal software used to steal passwords C) a type of input device D) software used to gather inofrmation about individuals
A) sell the data for research purposes after removing data from which individuals can be identified B) keep the data forever C) none of the above D) seel the data to other organisatiosn
A) enter any of the above B) enter personal details of your friends and families C) enter your address D) upload photosgraphghs of yourself that you would not want everyone to see
A) provide wrist rests for the keyboard B) pay for glasses for employees who need them, if they spend a lot of time using a computer C) all of the above D) plan work at a computer so there are frequent breaks
A) provide tiltable screens B) provide flat screens C) provide cup holders D) all of the above
A) has the screen above eye level B) has atleast 10m of space per person C) has an adjustable chair which supports the lower back D) all of the above
A) you should take regular breaks B) all of the above C) the room should be well-lit, not too bright and dim D) the light should not reflect off your computer screen
A) moving heavy computers about frequently B) using a computer in almost all of your lessons C) Using a keyboard for several hours a day D) sitting in the same position for too long
A) at worst, have to pay a fine B) at worst, face a prison sentence C) have their company closed down D) have their computer equipment confiscated
A) empty the recycle bin B) none of the above C) delete all the files on your computer D) reformat the hard drive
A) It should be taken apart and the outer casing recycled, the rest put in the bin B) It should be incinerated to ensure that sensitive data is destroyed C) It should be taken to a landfill site D) It should be taken to a recycling centre
A) Reciver files that you have deleted from your hard drive B) all of the above C) Recover files even if you have reformatted your hard drive D) Recover emails that you have sent |