Search Header Logo

Year 9 Computing

Authored by Ali Faulkner

Computers

9th Grade

Used 59+ times

Year 9 Computing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Computer Ethics?

A set of laws that relate to computers.

Doing the "right" thing when using a computer.

Doing the "wrong" thing when using a computer.

A set of rules that allow computers to communicate with each other.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Computer Legislation?

A set of laws that relate to computers.

Doing the "right" thing when using a computer.

Doing the "wrong" thing when using a computer.

A set of rules that allow computers to communicate with each other.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Computer Misuse Act make illegal?

Use someone's song without permission.

Hacking

Sharing people's private information.

Using someone's artwork without permission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Data Protection Act make illegal?

Use someone's song without permission.

Hacking

Sharing people's private information.

Using someone's artwork without permission.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT covered by the Copyright, Designs and Patents Act?

Using someone's song without permission.

Selling a copy of a computer game to a friend.

Sharing people's private information.

Using someone's artwork without permission.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a principle of the Data Protection Act?

It is illegal to gain unauthorised access to a computer.

All data must be kept secure.

All data must be relevant.

All data must be kept accurate and up-to-date.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of a White Hat Hacker?

They break into systems to cause chaos and steal data for their own benefits.

Often employed by large companies, they test systems and provide feedback on security.

They try not to cause damage, but are not helping either.

They are trying to learn how to hack and usually download scripts from the internet.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?