BTEC Level 3 Laws

BTEC Level 3 Laws

11th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

1.6 Privacy & Surveillance & Computing Laws

1.6 Privacy & Surveillance & Computing Laws

8th - 11th Grade

25 Qs

M2 Data Security, Camb Nats

M2 Data Security, Camb Nats

9th - 12th Grade

25 Qs

Eduqas ICT - Mr Schofield

Eduqas ICT - Mr Schofield

9th - 12th Grade

35 Qs

ONE 6th FORM Forensic Computing

ONE 6th FORM Forensic Computing

12th Grade

30 Qs

Unit 2 - April Recap Quiz

Unit 2 - April Recap Quiz

11th - 12th Grade

35 Qs

GDI Common Assessment 2 Review

GDI Common Assessment 2 Review

9th - 12th Grade

26 Qs

Cam Techs IT Unit 2 - Legislation

Cam Techs IT Unit 2 - Legislation

12th Grade

26 Qs

1.6 Issues with technology (J277)

1.6 Issues with technology (J277)

10th - 11th Grade

30 Qs

BTEC Level 3 Laws

BTEC Level 3 Laws

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Simon Graham

Used 16+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is part 3 of the Computer Misuse Act?

Unauthorized access to computer material

Unauthorized access with intent to commit or facilitate commission of further offences

Unauthorized modification of computer material

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these do not concern the Copyright Designs and Patents Act?

Illegally downloading a game

Illegally downloading music

Illegally downloading a software license

Illegally distributing a virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Signing into someone's account is a level...

1 violation of the Computer Misuse Act

2 violation of the Computer Misuse Act

3 violation of the Computer Misuse Act

4 violation of the Computer Misuse Act!!!!!!

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is gaining unauthorised access to a computer system also known as?
Hacking
Spamming
Phishing
Logging on

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the Computer Misuse Act of 1990 introduced?
To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information. 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following could protect against unauthorised access to an ICT system?
anti-virus software
a firewall
anti-malware software
disk defragger

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Computer Misuse Act you are committing a crime if you use your friend’s username and password to log onto their account?
True
False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?