Computer Crime and Cyber Security Assessment

Computer Crime and Cyber Security Assessment

8th Grade

21 Qs

quiz-placeholder

Similar activities

Computer Components

Computer Components

5th - 12th Grade

23 Qs

ICT-CE-Chapter 2 Part 1

ICT-CE-Chapter 2 Part 1

6th - 8th Grade

17 Qs

How the Internet Works

How the Internet Works

6th - 8th Grade

20 Qs

Introduction to Python programming

Introduction to Python programming

6th - 8th Grade

20 Qs

All About Google Drive

All About Google Drive

6th - 8th Grade

20 Qs

AQA GCSE Computer Science - 3.6.1 Security Malicious Code

AQA GCSE Computer Science - 3.6.1 Security Malicious Code

8th - 10th Grade

19 Qs

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

Internet Browsers

Internet Browsers

7th - 8th Grade

18 Qs

Computer Crime and Cyber Security Assessment

Computer Crime and Cyber Security Assessment

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Michael Wade

Used 25+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal under:

The Data Protection Act or GDPR

The Computer Misuse Act

Copyright Law

Health and Safety Law

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email

delete the email

send some money

forward the email to a mutual friend

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can protect yourself against spam or fraudulent emails by:

using a spam filter

never clicking on links that you are suspicious of

being aware of different types of fraudulent email

all options

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under the Computer Misuse Act, it is illegal to:

look at someone else’s computer files without permission

look at someone else’s computer files without permission with intent to commit further criminal offences

change data on someone else’s computer files without permission

all of these options

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers:

will destroy your computer hardware

are rarely able to steal personal data

sometimes steal passwords so they can access your online account

can only steal one password at a time

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?