GCSE Computer Science - Unit 1.6 J277 Ethical...

GCSE Computer Science - Unit 1.6 J277 Ethical...

9th - 12th Grade

12 Qs

quiz-placeholder

Similar activities

1. Investigation and Seizure

1. Investigation and Seizure

12th Grade

15 Qs

IT Unit 11 Cyber Security Key Terms

IT Unit 11 Cyber Security Key Terms

11th - 12th Grade

10 Qs

H466 - Networking Costs and Benefits

H466 - Networking Costs and Benefits

12th Grade - University

10 Qs

OCR GCSE Software licenses.

OCR GCSE Software licenses.

9th - 10th Grade

14 Qs

The Pixel's

The Pixel's

12th Grade

10 Qs

Threats to data & protecting data (Christmas Quiz)

Threats to data & protecting data (Christmas Quiz)

12th Grade

13 Qs

GCSE OCR 1.3 Learning review 01

GCSE OCR 1.3 Learning review 01

9th Grade

14 Qs

BTEC National ICT U2 - Database Theory Lesson 1-3

BTEC National ICT U2 - Database Theory Lesson 1-3

12th Grade

10 Qs

GCSE Computer Science - Unit 1.6 J277 Ethical...

GCSE Computer Science - Unit 1.6 J277 Ethical...

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Alex Booth

Used 392+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is meant by the term 'stakeholder'? (1-4)

A person who owns a product or organisation

Anyone who has an interest or concern about a product or organisation

A person who buys products from an organisation

A person who creates the legislation that governs buying/selling of products

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which legislation governs the act of hacking? (1-4)

The Freedom of Information Act

The Data Protection Act

Creative Commons License

The Computer Misuse Act

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does the Data Protection Act give an individual the right to do? (3-6)

A right to request the data an organisation holds about them without paying a fee

A right to request the data an organisation holds on them for a fee

A right to request the data an organisation holds about anyone without paying a fee

A right to request the data an organisation holds about anyone for free

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which legislation governs the act of intellectual property theft? (1-4)

The Copyright, Designs and Patents Act

The Data Protection Act

The Freedom of Information Act

The Computer Misuse Act

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who is responsible for making sure the requirements of the Data Protection Act are upheld in an organisation (6-9)

The Individual

The Data Controller

The Stakeholder

The Computer Network

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is true about open source software? (3-6)

The software cannot be copied, modified or shared

The software can be copied, modified or shared

There is normally a cost to pay for a license to use the software

The software is not available for public use

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is false about proprietary software? (3-6)

The software cannot be copied, modified or shared

The software can be copied, modified or shared

A fee is usually required to purchase a software license

An example of the software is the Microsoft Office suite

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?