Ben - 31/01/17 - Misuse act

Ben - 31/01/17 - Misuse act

11th Grade

12 Qs

quiz-placeholder

Similar activities

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

USING HAND TOOLS

USING HAND TOOLS

11th Grade

10 Qs

BTEC DIT C3 LAA - Maintenance, Set up, Performance

BTEC DIT C3 LAA - Maintenance, Set up, Performance

10th - 11th Grade

10 Qs

SciVis II 4 D

SciVis II 4 D

9th - 12th Grade

16 Qs

Overview of IT

Overview of IT

6th Grade - University

8 Qs

ICT_LU3-Computer Software_League2

ICT_LU3-Computer Software_League2

10th - 12th Grade

10 Qs

BTEC Theory quiz 1: Networks and Internet

BTEC Theory quiz 1: Networks and Internet

8th - 11th Grade

16 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Ben - 31/01/17 - Misuse act

Ben - 31/01/17 - Misuse act

Assessment

Quiz

Computers

11th Grade

Hard

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is gaining unauthorised access to a computer system also known as?

Hacking
Spamming
Phishing
Logging on

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the Computer Misuse Act of 1990 introduced?

To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information. 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the law that makes hacking illegal?

Data Protection Act
Computer Misuse Act
Copyright, Designs and Patents Act
Hacking Act

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which year was the Computer Misuse Act passed?

2000
1989
1990
1988

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an offence under the Computer Misuse Act?

Unauthorised access to someone else's files
Unauthorised access to someone else's files with intent to commit further criminal offences
Copying software and trying to sell it to someone for a profit
Writing and distributing a virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following could protect against unauthorised access to an ICT system?

Anti-virus software
A firewall
Anti-malware software
Disk Defragment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Computer Misuse Act you are committing a crime if you use your friend’s username and password to log onto their account?

True
False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?