1) Which of these is formatted as an alphanumeric data type? a) 14/04/2021 b) £10.99 c) Y/N d) 432BJ 2) Identify one logical storage location a) the cloud b) the web 3) Identify one hardware consideration for a Human Computer Interface a) Size b) Too big c) Too small 4) Which type of test checks that a system will work on a device screen? a) user testing b) technical testing 5) Identify one storage location that could be used to store customer orders a) spreadsheets b) microsoft c) the cloud 6) What is information? a) data+context+example b) data+type+example c) data+context+structure 7) a project manager needs to take electronic files to a meeting with a client. which physical storage device could the project manager use to take these electronic files to the meeting? a) hard disk drive b) solid state drive c) usb stick 8) which of these hackers has permission to hack into a business computer system? a) black hat b) grey hat c) white hat 9) Hackers have accessed a business data base. Some of the stored data has been deleted. This is an example of... a) data destruction b) data manipulation c) data modification d) data theft 10) What is data theft? a) A customer's personal data is illegally accessed and used without their permission b) Customers may be unable to purchase goods/services via a company's website c) fake bank accounts created using personal details without the individual's knowledge d) re-directing a user to a fake website 11) What is denial of service a) A customer's personal data is illegally accessed and used without their permission  b) Customers may be unable to purchase goods/services via a company's website c) fake bank accounts created using personal details without the individual's knowledge d) re-directing a user to a fake website 12) what is identity theft? a) A customer's personal data is illegally accessed and used without their permission b) Customers may be unable to purchase goods/services via a company's website c) fake bank accounts created using personal details without the individual's knowledge d) re-directing a user to a fake website 13) Criminals promise goods to get the information they need a) baiting b) phishing c) scareware 14) Criminals use computer programs designed to trick a user into buying or downloading unnecessary and dangerous software a) baiting b) phishing c) scareware 15) What type of devices uses Mac OS and iOS a) Android b) Apple 16) How many parts does the Computer Misuse Act (CMA) have? a) 1 b) 2 c) 3 d) 5 e) 7 17) How long does copyright last for on a computer-generated works? a) 10 b) 20 c) 30 d) 50 e) 70 18) An  is a collection of images, charts/graphs, statistics and text that provides an easy-to-understand overview of a topic? a) Infographic b) Website c) Visualisation diagram d) Wireframe 19) What does RTD stand for? a) Real-time date b) Real-time data c) Real-test data d) Real-test date 20) How is display size measured? a) Diagonal length of device b) Width c) Length 21) What type of design tool is used to present data in a diagrammable form? a) Flowcharts b) Wireframe c) Visualisation diagram d) Mindmap 22) Which is the odd one out? a) Operating system b) VOIP c) NAS d) Solid State

Leaderboard

Visual style

Options

Switch template

Continue editing: ?