BTEC Tech Award DIT - Computer Crimes

BTEC Tech Award DIT - Computer Crimes

9th Grade

8 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

Y8 Computer crime 2

Y8 Computer crime 2

7th - 9th Grade

10 Qs

Computing laws

Computing laws

9th - 12th Grade

12 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

H Plenary - Computer Misuse Act 1990

H Plenary - Computer Misuse Act 1990

9th Grade - University

6 Qs

Cybersecurity

Cybersecurity

8th - 12th Grade

10 Qs

Communication & Networking - Advantages of Networking

Communication & Networking - Advantages of Networking

3rd - 12th Grade

10 Qs

ICDL IT Security Policies

ICDL IT Security Policies

9th Grade

8 Qs

BTEC Tech Award DIT - Computer Crimes

BTEC Tech Award DIT - Computer Crimes

Assessment

Quiz

Computers

9th Grade

Medium

Created by

E Gibson

Used 31+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is gaining unauthorised access to a computer system also known as?
Hacking
Spamming
Phishing
Logging on

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the Computer Misuse Act of 1990 introduced?
To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information. 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an offence under the Computer Misuse Act?
unauthorised access to someone else's files
unauthorised access to someone else's files with intent to commit further criminal offences
copying software and trying to sell it to someone for a profit
writing and distributing a virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Computer Misuse Act also makes it illegal to copy software
True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which year was the Computer Misuse Act passed?
2000
1989
1990
1988

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Computer Misuse Act you are committing a crime if you use your friend’s username and password to log onto their account?
True
False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A type of hardware that hackers use to damage computers

A type of software that is used to damage computers

An approach that hackers use to damage computer systems

A virus

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you commit a crime under Section A of the Computer Misuse Act you receive...?
Up to 12 Months in prison and/or a fine
Life imprisonment
£1000 Fine