Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

quiz-placeholder

Similar activities

Arduino

Arduino

7th - 9th Grade

15 Qs

New Scratch

New Scratch

6th - 8th Grade

20 Qs

HTML

HTML

8th - 12th Grade

15 Qs

El Computador

El Computador

5th - 11th Grade

20 Qs

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

4th - 8th Grade

16 Qs

HTML and CMS

HTML and CMS

9th Grade

15 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

Assessment

Quiz

Computers

8th - 9th Grade

Hard

Created by

Jon Bridgeman

Used 358+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal under:

The Data Protection Act

The Computer Misuse Act

Copyright Law

Health and Safety Law

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email

delete the email

send some money

forward the email to a mutual friend

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can protect yourself against spam or fraudulent emails by:

using a spam filter

never clicking on links that you are suspicious of

being aware of different types of fraudulent email

all of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under the Computer Misuse Act, it is illegal to:

look at someone else’s computer files without permission

look at someone else’s computer files without permission with intent to commit further criminal offences

change data on someone else’s computer files without permission

all of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?