Y8 Computer crime 2

Y8 Computer crime 2

7th - 9th Grade

10 Qs

quiz-placeholder

Similar activities

Network Threats (KS3)

Network Threats (KS3)

9th Grade

11 Qs

Cyber Crime Lesson 1

Cyber Crime Lesson 1

7th Grade

10 Qs

Bitesize eSafety Quiz

Bitesize eSafety Quiz

8th Grade

10 Qs

cyber safety

cyber safety

9th Grade

11 Qs

Network Security

Network Security

9th Grade

13 Qs

BTEC Tech Award DIT - Threats to Data

BTEC Tech Award DIT - Threats to Data

9th Grade

10 Qs

Virus, Worms and Trojan Horses

Virus, Worms and Trojan Horses

7th - 9th Grade

15 Qs

Online Scams and Schemes

Online Scams and Schemes

7th Grade

11 Qs

Y8 Computer crime 2

Y8 Computer crime 2

Assessment

Quiz

Computers

7th - 9th Grade

Hard

Created by

Sharbrook stapleton

Used 131+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which law says

It’s illegal to look at or modify someone else’s files without permission

Computer Misuse Act

Copyright law

Identity Act

There is no Law

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Any attempt to manipulate or ‘con’ someone into

giving out confidential information (password or account number) which can be used to impersonate them, to install malware

Malware

Shareware

Social Engineering

Computer Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

forward the email to a friend to check

report it as a possible phishing scam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fraudulent email which is trying to obtain your username and password for a particular site will typically:

have a heading with a logo which appears genuine

address you by name

offer sums of money

appear to come from a friend

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

deleting the email

pointing to the link without clicking

replying to the email

clicking on the link

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can protect your files from unauthorised access by:

only allowing your friends and family to know your passwords

making frequent backups

choosing a strong password and changing it regularly

never using computers in a public place such as a library

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer virus is a small program which:

you may unintentionally transmit to other computers

will destroy your computer hardware

can only be transmitted via email

cannot be removed from your computer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?