3.1.6 Implications of computer use

Dean Wakely
Quiz by Dean Wakely, updated more than 1 year ago
Dean Wakely
Created by Dean Wakely almost 6 years ago
14
0

Description

Try your best

Resource summary

Question 1

Question
Complete the first principle of the Data Protection Act(1998) , Personal Data shall be....
Answer
  • processed fairly and lawfully
  • sold to the first person to ask for it
  • dealt on the blackmarket
  • sold on ebay

Question 2

Question
What (under the Computer Misuse act of 1990) is the maximum prison time and fine?
Answer
  • Community service
  • Don't care i have money
  • Six Months and/or £5,000
  • 18 Years and/or 99p

Question 3

Question
Who was 'Solo'?
Answer
  • Solo, Han Solo
  • Solo was a computer hacker who hacked into the FBI, CIA and The Pentagon.
  • There is not Solo on Zuul

Question 4

Question
Who was ASTRA?
Answer
  • Astra phoenix
  • Nobody knows
  • No clue

Question 5

Question
Hacking can cause disruption and cost businesses and individuals a lot of money to deal with
Answer
  • True
  • False

Question 6

Question
It's ok to hack into someone's computer
Answer
  • True
  • False

Question 7

Question
Some companies employ hackers to test out how secure their system is
Answer
  • True
  • False

Question 8

Question
A virus is a piece of software code
Answer
  • True
  • False

Question 9

Question
Sending or distibuting viruses knowingly is against the law
Answer
  • True
  • False

Question 10

Question
If you are caught hacking or distributing viruses you could go to prison
Answer
  • True
  • False

Question 11

Question
It's ok to send harmless viruses that are just for a laugh
Answer
  • True
  • False

Question 12

Question
The Computer Misuse Act also makes it illegal to copy software
Answer
  • True
  • False

Question 13

Question
The computer misuse act covers people using computers to commit fraud
Answer
  • True
  • False

Question 14

Question
A person is guilty of an offence if the access he intends to secure is (select all that apply)
Answer
  • unauthorized
  • not granted
  • forced
  • for the bants
  • illegal
  • penetrative
Show full summary Hide full summary

Similar

A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
3.1.2 - Software
AndrewZV
Software
15893
3.1.4 - Hardware
AndrewZV
Computing Hardware - CPU and Memory
Paul Jamrozy