UK Data Protection and Cyber Laws Quiz

UK Data Protection and Cyber Laws Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

Computing laws

Computing laws

9th - 12th Grade

12 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

BTEC DIT: Revision 1-6

BTEC DIT: Revision 1-6

1st - 12th Grade

11 Qs

Computer S/w

Computer S/w

10th Grade - University

16 Qs

Computing Ethics

Computing Ethics

KG - Professional Development

12 Qs

Cambridge Technicals Unit 3 Cybersecurity

Cambridge Technicals Unit 3 Cybersecurity

11th - 12th Grade

10 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

UK Data Protection and Cyber Laws Quiz

UK Data Protection and Cyber Laws Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Wayne Vaughan

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the Data Protection Act 1998?

To regulate internet usage.

To protect personal data held by organisations.

To prevent cybercrime.

To protect intellectual property.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a principle of the Data Protection Act 1998?

Data must be publicly available.

Data must be processed fairly and lawfully.

Data can be kept indefinitely.

Data security is optional.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under the Data Protection Act 1998, who is a "data subject"?

The organisation holding the data.

The individual whose personal data is being processed.

A computer system.

A government agency.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential consequence for breaching the Data Protection Act 1998?

A national holiday.

Fines.

A certificate of compliance.

Free advertising.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an offence under the Computer Misuse Act 1990?

Using a computer for work.

Unauthorised access to computer material.

Buying a new computer.

Sending an email.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between unauthorised access and unauthorised modification?

Access is legal, modification is illegal.

Access is gaining entry, modification is altering data.

Modification is gaining entry, access is altering data.

There is no difference.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the Computer Misuse Act 1990 address hacking?

It encourages hacking for educational purposes.

It criminalises unauthorised access, which includes hacking.

It ignores hacking.

It rewards ethical hacking.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?