Ben - 31/01/17 - Misuse act

Ben - 31/01/17 - Misuse act

11th Grade

12 Qs

quiz-placeholder

Similar activities

1.1.1 The structure and function of the processor

1.1.1 The structure and function of the processor

11th Grade - University

15 Qs

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

10th - 11th Grade

15 Qs

COMPUTER PROGRAMMING Q2_FLOWCHART (2 points each)

COMPUTER PROGRAMMING Q2_FLOWCHART (2 points each)

11th - 12th Grade

10 Qs

Ch. 4 Practice Quiz

Ch. 4 Practice Quiz

11th Grade

10 Qs

Random stuff

Random stuff

KG - Professional Development

12 Qs

ONLINE SAFETY

ONLINE SAFETY

11th Grade

15 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Ben - 31/01/17 - Misuse act

Ben - 31/01/17 - Misuse act

Assessment

Quiz

Computers

11th Grade

Hard

Used 9+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is gaining unauthorised access to a computer system also known as?
Hacking
Spamming
Phishing
Logging on

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was the Computer Misuse Act of 1990 introduced?
To help protect computer software
To help protect computer hardware
To stop the spread of computer viruses
To stop people from accessing unauthorised information. 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the law that makes hacking illegal?
Data Protection Act
Computer Misuse Act
Copyright, Designs and Patents Act
Hacking Act

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which year was the Computer Misuse Act passed?
2000
1989
1990
1988

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an offence under the Computer Misuse Act?
Unauthorised access to someone else's files
Unauthorised access to someone else's files with intent to commit further criminal offences
Copying software and trying to sell it to someone for a profit
Writing and distributing a virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following could protect against unauthorised access to an ICT system?
Anti-virus software
A firewall
Anti-malware software
Disk Defragment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Computer Misuse Act you are committing a crime if you use your friend’s username and password to log onto their account?
True
False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?