Data Protection Act & Computer Misuse Act

Data Protection Act & Computer Misuse Act

11th Grade

18 Qs

quiz-placeholder

Similar activities

Q2-Week1-Multimedia and ICT

Q2-Week1-Multimedia and ICT

11th Grade

15 Qs

1.3.1 Networks #1 LAN's, Client-Server, Peer to Peer

1.3.1 Networks #1 LAN's, Client-Server, Peer to Peer

9th - 11th Grade

15 Qs

Grade 11 Term 4 Practice 1

Grade 11 Term 4 Practice 1

11th Grade

13 Qs

Proses Komunikasi Data Pada Jaringan

Proses Komunikasi Data Pada Jaringan

11th Grade

20 Qs

Google Docs

Google Docs

5th Grade - University

13 Qs

TO PAS AIJ

TO PAS AIJ

11th Grade

20 Qs

TECHNO QUIZINE

TECHNO QUIZINE

11th - 12th Grade

20 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Data Protection Act & Computer Misuse Act

Data Protection Act & Computer Misuse Act

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Paul Greenwood

Used 589+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the name of the legislation that focuses on IT related crime?

Data Protection Act
GDSR
Computer Misuse Act
GDPR

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What are the principles of the Computer Misuse Act?

Authorised access,Authorised access with intent, Authorised 
Unauthorised access with intent and Unauthorised modification
Unauthorised access and Unauthorised modification
Unauthorised access, Unauthorised access with intent, Unauthorised modification

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What type of things can be classed as computer misuse?

Looking at personal emails during work time
Sending a joke on the work email to everyone in the system
Using another member of staffs PC when they have left it unlocked
Using a work computer to buy personal items

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is gaining unauthorised access to a computer system also known as?

Hacking
Spamming
Phishing
Logging on

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why was the Computer Misuse Act of 1990 introduced?

To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information. 

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following could protect against unauthorised access to an ICT system?

anti-virus software
a firewall
anti-malware software
disk defragger

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

According to the Computer Misuse Act you are committing a crime if you use your friend’s username and password to log onto their account?

True
False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?