A) requests a payment for goods you have not received B) offers you products in which you may have no interest C) encourages you to click on a link to a fraudulent website D) contains abusive and threatening language
A) report it as a possible phishing scam B) reply, pointing out the error C) click on the link in the email to check if it’s genuine D) forward the email to a friend to check
A) address you by name B) have a heading with a logo which appears genuine C) appear to come from a friend D) offer large sums of money
A) deleting the email B) replying to the email C) clicking the link D) pointing to the link without clicking
A) The Data Protection Act or GDPR B) The computer misuse act C) Copyright Law D) Health & Safety Law
A) send some money B) delete the email C) forward the email to a friend D) reply to the email
A) data theft B) copyright infringement C) virus attack D) hacking
A) being aware of different types of email B) all of the above C) using the spam filter D) never clicking on links that you are suspicious of
A) look at someone else’s computer files without permission with intent to commit further criminal offences B) all of the above C) change data on someone else’s computer files without permission D) look at someone else’s computer files without permission
A) will destroy your computer hardware B) sometimes steal passwords so they can access your online account C) are rarely able to steal your personal data D) can only steal one password at a time
A) only allowing your friends and family to know your passwords B) making frequent backups C) never using computers in public spaces, like a library D) Choosing a strong password and changing it regularly
A) can only be transmitted via email B) will destroy your computer hardware C) you may unintentionally transmit to other computers D) cannot be removed from your computer
A) a software bug B) unwanted software installed without consent C) a type of virus D) security software to detect viruses
A) Your browser alerts you it has blocked a pop-up window B) Your homepage has changed unexpectedly C) You receive a fraudulent email D) Your browser alerts you to update to a newer version
A) overwrite your files and corrupt your data B) steal important information from your computer C) use a lot of memory and slow down your computer D) all of the above
A) Viruses cannot be spread via email B) Anti-virus software will always prevent a virus from attacking your computer C) Viruses can completely destroy your computer D) It is easy to spot when your computer has a virus
A) Any of the above B) A new toolbar appears on your browser C) Your hard disk is working overtime but you're not doing anything D) You see a lot of pop up adverts even when you're offline
A) post personal details on social networking sites B) open emails from people you do not know C) Download music or software from illegal sites D) pen email attachments
A) use a foreign word that will not be in an English dictionary B) use something easy to remember like your pet’s name C) use a combination of letters and numbers that mean something to you but no one else D) save all your passwords in a file on your computer in case you forget one
A) none of the above B) they are atleast 8 characters long C) you change them regularly D) you can use different passwords for all your online accounts
A) JustinSmith B) Justin123456 C) ASDFGHpoiuy D) softcatsears
A) must delete the data when you leave B) has to ask permission to keep your data on their computer C) must register with the Information Comissioner D) must register with the Local Authority
A) All of the above B) The amount they spent last year at the supermarket C) Their loyalty card number D) Their address
A) The Personal data Act B) the General Data Protection Regulations C) The Criminal Misuse Act D) The Health & Safety Act
A) all personal data must be encrypted B) personal data held by an organisation must be protected from hackers C) personal data must be updated at least once a year D) only government organisations can hold personal data about you
A) they can log on any time to find out what data is held about them B) they can correct the data themselves C) they will be unable to get the data corrected D) they have a right to see what data the company holds about them
A) keep the data accurate and up to date B) all of the above C) allow people to see what data is held about them D) keep the data secure
A) the number of pupils in school B) the year that a particular pupil joined the school C) the school's email address D) the average percentage a*-c grades at gcse gained by pupils last year
A) software used to gather inofrmation about individuals B) a type of virus C) a type of input device D) illegal software used to steal passwords
A) sell the data for research purposes after removing data from which individuals can be identified B) keep the data forever C) none of the above D) seel the data to other organisatiosn
A) enter any of the above B) enter personal details of your friends and families C) enter your address D) upload photosgraphghs of yourself that you would not want everyone to see
A) plan work at a computer so there are frequent breaks B) pay for glasses for employees who need them, if they spend a lot of time using a computer C) provide wrist rests for the keyboard D) all of the above
A) all of the above B) provide tiltable screens C) provide cup holders D) provide flat screens
A) all of the above B) has an adjustable chair which supports the lower back C) has atleast 10m of space per person D) has the screen above eye level
A) you should take regular breaks B) all of the above C) the room should be well-lit, not too bright and dim D) the light should not reflect off your computer screen
A) sitting in the same position for too long B) Using a keyboard for several hours a day C) moving heavy computers about frequently D) using a computer in almost all of your lessons
A) have their computer equipment confiscated B) at worst, face a prison sentence C) at worst, have to pay a fine D) have their company closed down
A) none of the above B) reformat the hard drive C) empty the recycle bin D) delete all the files on your computer
A) It should be taken to a landfill site B) It should be taken to a recycling centre C) It should be incinerated to ensure that sensitive data is destroyed D) It should be taken apart and the outer casing recycled, the rest put in the bin
A) Recover files even if you have reformatted your hard drive B) Reciver files that you have deleted from your hard drive C) all of the above D) Recover emails that you have sent |