Search Header Logo

AQA 3.8 Eth Leg Env - KO 2 - CMA

Authored by Mark Weddell

Computers

10th Grade

Used 2+ times

AQA 3.8 Eth Leg Env - KO 2 - CMA
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

CMA stands for the Computer _______ ___ 

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The first purpose of the Computer Misuse Act is to prevent __________ _______ to computers.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Unauthorised access to computers is more commonly known as ________

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A second purpose of the Computer Misuse Act is to prevent anyone ___________ _________ the operation of computer systems

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Intentionally impairing the operation of computers can refer to ______ of ________ (DOS) attacks on web servers.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Intentionally impairing the operation of a computer can also refer to distributing ______

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Finally the Computer Misuse Act aims to prevent the _____ of data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers