BTEC IT Unit 1 - F - Laws

BTEC IT Unit 1 - F - Laws

10th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

History of the computer

History of the computer

12th Grade

20 Qs

UH 1 BTIK

UH 1 BTIK

10th Grade

15 Qs

Arduino_Quiz

Arduino_Quiz

12th Grade

20 Qs

Ethical and Social Issues in ICT

Ethical and Social Issues in ICT

10th Grade

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Python Syntax II

Python Syntax II

10th Grade

16 Qs

Quiz Informatika Bab 3 & 4

Quiz Informatika Bab 3 & 4

10th Grade

20 Qs

Java by Mr Sam

Java by Mr Sam

10th Grade

16 Qs

BTEC IT Unit 1 - F - Laws

BTEC IT Unit 1 - F - Laws

Assessment

Quiz

Computers

10th - 12th Grade

Practice Problem

Hard

Created by

Louise Lockwood

Used 378+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is part 3 of the Computer Misuse Act?

Unauthorized access to computer material

Unauthorized access with intent to commit or facilitate commission of further offences

Unauthorized modification of computer material

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these do not concern the Copyright Designs and Patents Act?

Illegally downloading a game

Illegally downloading music

Illegally downloading a software license

Illegally distributing a virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which act would give police legal permission to survey a potential suspects internet activities?

Data Protection Act

Freedom of Information Act

Computer Misuse Act

Regulation of Investigatory Powers Act

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Signing into someone's account is a level...

1 violation of the Computer Misuse Act

2 violation of the Computer Misuse Act

3 violation of the Computer Misuse Act

4 violation of the Computer Misuse Act!!!!!!

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is gaining unauthorised access to a computer system also known as?

Hacking
Spamming
Phishing
Logging on

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the Computer Misuse Act of 1990 introduced?

To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information. 

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following could protect against unauthorised access to an ICT system?

anti-virus software
a firewall
anti-malware software
disk defragger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers