7B2 - March Assessment
42 Questions
63 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What drives cybercrime in computer science?

Answer hidden

What does the term 'personal information' mean?

Answer hidden

What are some examples of cybercrime scams?

Answer hidden

Verify the identity of senders before opening emails containing attachments or clicking ______ links.

Answer hidden

Exercise caution when downloading free software or visiting ______ websites.

Answer hidden

How many characters should a strong password have?

Answer hidden

Remember, if something seems too good to be true—such as promises of instant wealth or exclusive offers from ______ sources—it likely isn't.

Answer hidden

A ________ scam is a type of malicious software designed to deceive users into installing it onto their computers or devices.

Answer hidden

Named after Greek mythology's wooden horse used by Greeks to conquer Troy, these scams follow the same principle. What is the name of this scam?

Answer hidden

What do you call a character in scratch?

Answer hidden

A phishing email is one which:

Answer hidden

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

Answer hidden

A fraudulent email which is trying to obtain your username and password for a particular site will typically:

Answer hidden

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

Answer hidden

Hacking is illegal under:

Answer hidden

what block do we use in scratch to create a loop?

Answer hidden

what is the difference between BCC and CC in an email?

Answer hidden

Justin has create a strong password : 1234. Can you write the 5 key rules to create a strong password for him?

Answer hidden

How do we store information in scratch, for example a score.

Answer hidden

Data harvesting tools allows someone to piece together information about you from all the information you publish online

Answer hidden

The data protection act states that personal data held by an organisation must be kept up to date

Answer hidden

An organisation such as a school holds personal data about you. The organisation:

Answer hidden

Which of the following is a "strong" password for someone name Justin Smith?

Answer hidden

Which of the following are signs of a possible malware attack?

Answer hidden

Gaining unauthorised access to someone else's computer files is known as:

Answer hidden

Explain how a username and password are used together to long-in to a computer

Answer hidden

Why is it important to have a secure password?

Answer hidden

Explain what a costume is in sprite?

Answer hidden

Describe what a stage is in scratch

Answer hidden

How does Scratch enable sprite animation?

Answer hidden

How can you animate a moving flower sprite to continuously move randomly across the stage in Scratch?

Answer hidden

In Scratch, how can you make a player sprite react when colliding with an enemy sprite?

Answer hidden

What is a algorithm?

Answer hidden

A variable is...

Answer hidden

How many pieces of information can a variable hold?

Answer hidden

What keyword means to unethically copy somebody else's work without permission.

Answer hidden

Give an example of 'creative work'

Answer hidden

What law protects owners of creative work?

Answer hidden

The copyright law protects owners of creative work from having it illegally copied. However an individual/ organisation can still use copyrighted creative work if they ask for specific permission from the author.

Answer hidden

How long does copyright last for?

Answer hidden

What is identity theft?

Answer hidden

What is a digital footprint?

Answer hidden

Use Quizgecko on...
Browser
Browser