A) requests a payment for goods you have not received B) offers you products in which you may have no interest C) contains abusive and threatening language D) encourages you to click on a link to a fraudulent website
A) forward the email to a friend to check B) click on the link in the email to check if it’s genuine C) report it as a possible phishing scam D) reply, pointing out the error
A) have a heading with a logo which appears genuine B) address you by name C) offer large sums of money D) appear to come from a friend
A) pointing to the link without clicking B) clicking the link C) replying to the email D) deleting the email
A) Copyright Law B) The Data Protection Act or GDPR C) The computer misuse act D) Health & Safety Law
A) delete the email B) reply to the email C) forward the email to a friend D) send some money
A) copyright infringement B) data theft C) virus attack D) hacking
A) all of the above B) being aware of different types of email C) using the spam filter D) never clicking on links that you are suspicious of
A) look at someone else’s computer files without permission B) look at someone else’s computer files without permission with intent to commit further criminal offences C) all of the above D) change data on someone else’s computer files without permission
A) are rarely able to steal your personal data B) will destroy your computer hardware C) sometimes steal passwords so they can access your online account D) can only steal one password at a time
A) Choosing a strong password and changing it regularly B) making frequent backups C) never using computers in public spaces, like a library D) only allowing your friends and family to know your passwords
A) can only be transmitted via email B) cannot be removed from your computer C) will destroy your computer hardware D) you may unintentionally transmit to other computers
A) unwanted software installed without consent B) a type of virus C) a software bug D) security software to detect viruses
A) You receive a fraudulent email B) Your homepage has changed unexpectedly C) Your browser alerts you to update to a newer version D) Your browser alerts you it has blocked a pop-up window
A) overwrite your files and corrupt your data B) all of the above C) use a lot of memory and slow down your computer D) steal important information from your computer
A) Viruses cannot be spread via email B) It is easy to spot when your computer has a virus C) Viruses can completely destroy your computer D) Anti-virus software will always prevent a virus from attacking your computer
A) You see a lot of pop up adverts even when you're offline B) Any of the above C) A new toolbar appears on your browser D) Your hard disk is working overtime but you're not doing anything
A) post personal details on social networking sites B) open emails from people you do not know C) pen email attachments D) Download music or software from illegal sites
A) use a foreign word that will not be in an English dictionary B) use something easy to remember like your pet’s name C) save all your passwords in a file on your computer in case you forget one D) use a combination of letters and numbers that mean something to you but no one else
A) they are atleast 8 characters long B) you can use different passwords for all your online accounts C) none of the above D) you change them regularly
A) softcatsears B) Justin123456 C) ASDFGHpoiuy D) JustinSmith
A) must register with the Information Comissioner B) must register with the Local Authority C) has to ask permission to keep your data on their computer D) must delete the data when you leave
A) Their loyalty card number B) All of the above C) The amount they spent last year at the supermarket D) Their address
A) The Health & Safety Act B) the General Data Protection Regulations C) The Criminal Misuse Act D) The Personal data Act
A) only government organisations can hold personal data about you B) personal data held by an organisation must be protected from hackers C) personal data must be updated at least once a year D) all personal data must be encrypted
A) they will be unable to get the data corrected B) they can correct the data themselves C) they can log on any time to find out what data is held about them D) they have a right to see what data the company holds about them
A) allow people to see what data is held about them B) all of the above C) keep the data accurate and up to date D) keep the data secure
A) the number of pupils in school B) the year that a particular pupil joined the school C) the average percentage a*-c grades at gcse gained by pupils last year D) the school's email address
A) a type of virus B) software used to gather inofrmation about individuals C) a type of input device D) illegal software used to steal passwords
A) keep the data forever B) sell the data for research purposes after removing data from which individuals can be identified C) none of the above D) seel the data to other organisatiosn
A) enter any of the above B) enter your address C) upload photosgraphghs of yourself that you would not want everyone to see D) enter personal details of your friends and families
A) all of the above B) provide wrist rests for the keyboard C) plan work at a computer so there are frequent breaks D) pay for glasses for employees who need them, if they spend a lot of time using a computer
A) all of the above B) provide flat screens C) provide cup holders D) provide tiltable screens
A) has the screen above eye level B) has atleast 10m of space per person C) all of the above D) has an adjustable chair which supports the lower back
A) the light should not reflect off your computer screen B) the room should be well-lit, not too bright and dim C) you should take regular breaks D) all of the above
A) moving heavy computers about frequently B) Using a keyboard for several hours a day C) sitting in the same position for too long D) using a computer in almost all of your lessons
A) have their computer equipment confiscated B) have their company closed down C) at worst, face a prison sentence D) at worst, have to pay a fine
A) reformat the hard drive B) none of the above C) empty the recycle bin D) delete all the files on your computer
A) It should be incinerated to ensure that sensitive data is destroyed B) It should be taken to a landfill site C) It should be taken apart and the outer casing recycled, the rest put in the bin D) It should be taken to a recycling centre
A) Recover files even if you have reformatted your hard drive B) Reciver files that you have deleted from your hard drive C) all of the above D) Recover emails that you have sent |