Year 9 E-safety Test

Is this your test? Login to manage it. If not, you can make an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
25. The law states that:
2.
1 point
27. The law regarding holding personal data states that if a company holds personal data it must:
3.
1 point
3. A fraudulent email which is trying to obtain your username and password for a particular site will typically:
4.
1 point
17. Which of the following is a sign of a possible malware attack?
5.
1 point
33. Health and Safety regulations require an employer to:
6.
1 point
32. Health and Safety regulations require an employer to:
7.
1 point
26. If someone suspects that a company holds inaccurate information about them:
8.
1 point
20. You can be confident your passwords are completely secure if:
9.
1 point
31. When you enter personal details on social networking sites you should never:
10.
1 point
12. A computer virus is a small program which:
11.
1 point
19. When choosing a password you should:
12.
1 point
29. A “data harvesting tool” is:
13.
1 point
7. Gaining unauthorised access to someone else’s computer files is known as:
14.
1 point
37. Employers who ignore Health and Safety rules regarding computer use may:
15.
1 point
5. Hacking is illegal under:
16.
1 point
10. Hackers:
17.
1 point
34. A well-designed workstation:
18.
1 point
4. You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
19.
1 point
36. RSI (Repetitive Strain Injury) can be caused by:
20.
1 point
9. Under the Computer Misuse Act, it is illegal to:
21.
1 point
18. To avoid your computer being infected by malware, you should not:
22.
1 point
24. The Act which specifies the rules about collecting and holding personal data is called:
23.
1 point
40. A data recovery program can:
24.
1 point
23. Which of the following is “personal data” which may be held about someone on the computer system of a supermarket?
25.
1 point
38. When disposing of an old computer, to protect your personal information it is sufficient to:
26.
1 point
15. A computer virus may:
27.
1 point
14. Which of these is a sign of malware on your computer?
28.
1 point
11. You can protect your files from unauthorised access by:
29.
1 point
6. You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:
30.
1 point
8. You can protect yourself against spam or fraudulent emails by:
31.
1 point
21. Which of the following is a “strong” password for someone named Justin Smith?
32.
1 point
2. If you receive an email from a well-known company, but its name is mis-spelt in the sender’s address, you should:
33.
1 point
35. To reduce the danger of eyestrain from using a computer:
34.
1 point
39. When disposing of an old computer:
35.
1 point
16. Which of the following is true?
36.
1 point
30. Organisations holding personal data are allowed to:
37.
1 point
22. An organisation such as a school holds personal data about you. The organisation:
38.
1 point
13. “Malware” is:
39.
1 point
28. Which of the following data is considered to be “personal data” when held by a school:
40.
1 point
1. A phishing email is one which: