
Data Protection and Intellectual Property Quiz
Authored by Rob Whitehouse
Health Sciences
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would a business typically record as client data?
Purchase history
Religion
Biometrics
Political opinions
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a reason why companies should protect their intellectual property?
To prevent others from copying or misusing their inventions or products
To protect the environment and natural resources
To protect their branding, which is highly recognisable and uniquely associated with their reputation
To protect their competitive advantage in the marketplace
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Data Protection Act 2018 applies to:
Land-based businesses only
Public limited companies only
Public sector organisations only
All businesses and organisations
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under the Data Protection Act 2018, individuals have a number of rights over their data. Which of the following describes the right of a person to request the correction of any inaccurate or incomplete personal data that is being held about them?
Right to erasure
Right to rectification
Right to access
Right to restrict processing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Data Protection Act 2018 gives individuals the right to object. Which phrase most accurately describes this right?
To object to the storing of their personal data, such as in a customer database, for 10 years or more
To object to the processing of their personal data in certain circumstances, such as when the processing is based on legitimate interests or for direct marketing purposes
To receive a copy of their personal data in a structured, commonly used and machine-readable format, and to transfer that data to another data controller
To object to their personal data being erased or deleted.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of managing different versions of a document or file is known as:
Trojan control
Version regulation
Version control
File management
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about cyberattacks is true?
Cyberattacks can’t be used to steal data
Cyberattacks only happen to government computer systems
Cyberattacks and cyberwarfare mean the same thing
Cyberattacks are intended to disrupt or destroy a computer system
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?