Search Header Logo

Year 8 Computing - Cyber Crime

Authored by Jon Bridgeman

Computers

8th - 9th Grade

20 Questions

Used 359+ times

Year 8 Computing - Cyber Crime
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal under:

The Data Protection Act

The Computer Misuse Act

Copyright Law

Health and Safety Law

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email

delete the email

send some money

forward the email to a mutual friend

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can protect yourself against spam or fraudulent emails by:

using a spam filter

never clicking on links that you are suspicious of

being aware of different types of fraudulent email

all of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under the Computer Misuse Act, it is illegal to:

look at someone else’s computer files without permission

look at someone else’s computer files without permission with intent to commit further criminal offences

change data on someone else’s computer files without permission

all of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?