
Ethical, legal and cultural impacts
Quiz by GCSE Computer Science Teacher 3
GCSE (AQA)
Computer Science
English National Curriculum
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 1 skill from
Measures 1 skill from
Track each student's skills and progress in your Mastery dashboards
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
14 questions
Show answers
- Q1What does the Copyright Designs and Patents Act do?Protects the owner of a creative work from having it illegally copiedProtects owners of creative work for all pieces of work in the futureProtects owners of a creative work from having their personal details being stolenProtects potential buyers of creative work from being scammed45s3.7.1
- Q2Why is it illegal for an individual to copy software such as a games or application?The software based product belongs to the owner of the creative work and to buy a copy you would need to purchase itThe software based product belongs to the public so you wouldn't need to copy itThe software based product belongs to the government as it is contributing to the economyThe software based product is one which may have a creative commons licence45s3.7.1
- Q3Which of these cannot be patented using the copyright act?A students essayA hardware designAn algorithmA painting45s3.7.1
- Q4Major technology companies such as Google, are able to collect what type of data about us?Meta DataMacro DataMinor DataMetro Data45s3.7.1
- Q5The government amended the law in 2017 to be able to access to everyone's personal data because?They need to monitor what everyone is doing to make new lawsThey need to monitor everyone to make future decisions on the economyThey cannot keep the countries internet access secure without doing soTo help keep the country safe from potential attacks such as terrorist based attacks45s3.7.1
- Q6In terms of computers, what is hacking?The gaining of access to your computer systemThe gaining of access to any computer systemThe gaining of unauthorized access to data in a system or computerThe gaining of access to third party systems45s3.7.1
- Q7What is considered ethical hacking?When someone with permission to do so hacks a computer or network in order to find flaws in the system, in order to fix themWhen someone hacks a computer because they believe it is the right thing to doWhen someone hacks into a system for fun, not to cause damageWhen someone gains unauthorized access to a computer system and then offers to fix them for a fee45s3.7.1
- Q8What is cloud storage?Data is stored in an external secondary storage device via your internet connectionData is stored on your hard drive, but can be shared via your networkData is stored on a local server in your school or work placeData is maintained, managed, backed up remotely to a server and made available to users over a network45s3.7.1
- Q9What is one potential disadvantage of using cloud storage?It is expensive to set upYou can not access it on mobile phonesIf it is hacked, then your data is at riskIt has a small storage capacity45s3.7.1
- Q10Cracking software is an illegal act because?The software has effectively been stolen as it has not been paid for or downloaded with permissionThe software would of been illegally cracked to not require certification to use some featuresSoftware companies would have copy righted their softwareAll of these45s3.7.1
- Q11Cookies are an example of a potential privacy issue because?They can tell companies how much you spent on rival productsThey monitor your activities to force you to buy goodsThey personalise websites for you, including targeting advertisements which you may not wantThey monitor your location to keep a track off you45s3.7.1
- Q12What are computer based implants?A device that can be implanted into your computerA device that can be implanted into your rubbish binA device that can be implanted into the body of a human or animalA device that can be implanted into your smartphone45s3.7.1
- Q13What are computer based implants being more commonly used for?Trackers for humansBuilt in headsets for humansAll of theseID chips for human beings45s3.7.1
- Q14What could be included in meta data?Instagram storiesPersonal textsSnap chat images sentAll of these45s