1) How can a company stop rivals from using their data a) They csn’t do anything b) Prosecute them c) Patent ideas d) Pay rivals not to release their product 2) Can you file a Freedom of Information request a) Yes b) No c) Maybe d) No idea 3) What offence is breached when a hacker steals files a) Unauthorised access with intent to commit crimes b) Unauthorised changes to files c) Unauthorised access to files 4) When was the computer misuse act legislated a) 1090 b) 1990 c) 1001 d) 2000 5) What law makes changes to files without permission an offence a) The Copyright Design and Patents Act b) Computer Misuse Act c) Data Protection Act d) Computer usage act 6) When was the Copyright, Designs and Patents Act legislated? a) 2018 b) 1990 c) 1988 d) 2000 7) When was the data protection act legislated a) 1990 b) 1998 c) 1999 d) 2001 8) What law covers copying others work a) The Copyright, Designs and Patents Act b) Data protection act c) Computer Misuse Act 9) How many principles are in the Data Protection Act a) 5 b) 8 c) 7 d) 2 e) 10 10) Once you bought a license to software, can you distribute as you like? a) Yes b) No c) Maybe d) Sometimes 11) Is someone hacks your email, what law was broken a) Data protection Act b) Copyrights, Designs and Patents Act c) Freedom of Information Act d) Computer Misuse Act 12) What law ensures organisations look after data a) Data protection Act b) Data protection Law c) Data privacy law 13) What can you do with a Creative Commonds License a) Take legal action for no reason b) Specify how original information can be used c) Specify how to not use your information  14) What law are you breaking if you download a pirated movie? a) Copyright Designs and Patents Act b) Computer Misuse Act c) Data protection Act 15) What is the max punishment for breaking the Computer Misuse Act a) £5000 fine b) £2000 fine and 1 year in jail c) £5000 fine with several years in jail 16) What is Copyright a) Legal means of ensuring content creators can protect creations b) Illegal means of ensuring data is not used illegally c) Data that is free to use by anyone 17) Do you need a © symbol for copyright a) Yes b) No c) Maybe d) Sometimes 18) Can you use data without permission a) No b) Yes c) Maybe 19) What is personal data a) Data about you b) Data about the world c) Data about your family 20) Who can access personal data a) People who have permission b) People who don’t have permission c) Anyone 21) What is system software (3 answers) a) Maintains/governs computer b) Doesn’t allow anything c) a system d) Allows programs to run and allows user interface e) Controls GUI f) Controls hardware and peripherals 22) What is a peripheral a) Hardware b) Connected to PC c) Hardware connected to PC d) A pen 23) What is peripherals operated by a) Devices b) Device drivers c) A application software 24) What are device drivers a) Instructions on how to control devices b) Instructions on how not to control devices c) Instructions on how to use a computer 25) What does contiguous mean a) Running b) Runs in any order c) Runs in sequence 26) What is meant by multitasking a) Where you work on 1 thing b) Where you work c) Where you do a task d) Where 2 programs run at the same time 27) What is paging a) Files b) Files broken up into fixed size blocks c) Files that are broken 28) What is an operating system a) Collection of programs b) Programs that manages and controls computer c) Programs d) A game code 29) What is GUI - stands for a) Graphical User Interface b) Graphical Unit Interface c) Graphical Umbrella Interface 30) What does a GUI show a) Icons on a screen b) The floor c) The sky d) the programs 31) What is Mobile User Interface(MUI) do a) Different to GUI, interacted by mous b) Similar to GUI, interacted by mouse c) Similar to GUI, interacted by touch 32) How is GUI interacted with the user by? a) Mouse b) Keyboard c) Touch 33) Explain what is meant by Command Line Interface a) Interaction by typing in commands b) Interaction via mouse c) Shown by code 34) What is encryption mean a) Doesn’t do anything b) Disguises files as gibberish c) Shows off what you know 35) Who can access an encrypted item a) The sun b) Unauthorised users c) Anyone d) Authorised users 36) What is a full backup a) Backup of new files b) Backup of all files c) Backup in general 37) What is a incremental backup a) Backup of old files b) Backup of all files c) Backup of new files 38) What is compression a) Data doubled in storage b) Data reduced of a file c) Data in general 39) What is fragmentation a) Where files are broken down into segments b) Where files are stored c) Where files are doubled 40) What is defragmentation a) Putting the segments in a random order b) Putting segments in order c) Putting segments into place

Leaderboard

Visual style

Options

Switch template

Continue editing: ?