Search Header Logo

Computer Crime End of unit Assessment SPA

Authored by Lee Woodhouse

Computers

6th - 8th Grade

Used 41+ times

Computer Crime End of unit Assessment SPA
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A fraudulent email which is trying to obtain your username and password for a particular site will typically:

have a heading with a logo which appears genuine

address you by name

offer large sums of money

appear to come from a friend

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

pointing to the link without clicking

deleting the email

replying to the email

clicking on the link

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hacking is illegal under:

The Data Protection Act or GDPR

The Computer Misuse Act

Copyright Law

Health and Safety Law

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email

delete the email

send some money

forward the email to a mutual friend

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?