
Computer Misuse Act
Authored by Kevin Johnson
Computers
10th - 12th Grade
Used 4K+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is gaining unauthorised access to a computer system also known as?
Hacking
Spamming
Phishing
Logging on
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why was the Computer Misuse Act of 1990 introduced?
To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the law that makes hacking illegal?
Data Protection Act
Computer Misuse Act
Copyright, Designs and Patents Act
Hacking Act
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which year was the Computer Misuse Act passed?
2000
1989
1990
1988
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an offence under the Computer Misuse Act?
unauthorised access to someone else's files
unauthorised access to someone else's files with intent to commit further criminal offences
copying software and trying to sell it to someone for a profit
writing and distributing a virus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following could protect against unauthorised access to an ICT system?
anti-virus software
a firewall
anti-malware software
disk defragger
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the Computer Misuse Act you are committing a crime if you use your friend’s username and password to log onto their account?
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?