Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    What does the Copyright Designs and Patents Act do?
    Protects the owner of a creative work from having it illegally copied
    Protects owners of creative work for all pieces of work in the future
    Protects owners of a creative work from having their personal details being stolen
    Protects potential buyers of creative work from being scammed
    45s
    3.7.1
  • Q2
    Why is it illegal for an individual to copy software such as a games or application?
    The software based product belongs to the owner of the creative work and to buy a copy you would need to purchase it
    The software based product belongs to the public so you wouldn't need to copy it
    The software based product belongs to the government as it is contributing to the economy
    The software based product is one which may have a creative commons licence
    45s
    3.7.1
  • Q3
    Which of these cannot be patented using the copyright act?
    A students essay
    A hardware design
    An algorithm
    A painting
    45s
    3.7.1
  • Q4
    Major technology companies such as Google, are able to collect what type of data about us?
    Meta Data
    Macro Data
    Minor Data
    Metro Data
    45s
    3.7.1
  • Q5
    The government amended the law in 2017 to be able to access to everyone's personal data because?
    They need to monitor what everyone is doing to make new laws
    They need to monitor everyone to make future decisions on the economy
    They cannot keep the countries internet access secure without doing so
    To help keep the country safe from potential attacks such as terrorist based attacks
    45s
    3.7.1
  • Q6
    In terms of computers, what is hacking?
    The gaining of access to your computer system
    The gaining of access to any computer system
    The gaining of unauthorized access to data in a system or computer
    The gaining of access to third party systems
    45s
    3.7.1
  • Q7
    What is considered ethical hacking?
    When someone with permission to do so hacks a computer or network in order to find flaws in the system, in order to fix them
    When someone hacks a computer because they believe it is the right thing to do
    When someone hacks into a system for fun, not to cause damage
    When someone gains unauthorized access to a computer system and then offers to fix them for a fee
    45s
    3.7.1
  • Q8
    What is cloud storage?
    Data is stored in an external secondary storage device via your internet connection
    Data is stored on your hard drive, but can be shared via your network
    Data is stored on a local server in your school or work place
    Data is maintained, managed, backed up remotely to a server and made available to users over a network
    45s
    3.7.1
  • Q9
    What is one potential disadvantage of using cloud storage?
    It is expensive to set up
    You can not access it on mobile phones
    If it is hacked, then your data is at risk
    It has a small storage capacity
    45s
    3.7.1
  • Q10
    Cracking software is an illegal act because?
    The software has effectively been stolen as it has not been paid for or downloaded with permission
    The software would of been illegally cracked to not require certification to use some features
    Software companies would have copy righted their software
    All of these
    45s
    3.7.1
  • Q11
    Cookies are an example of a potential privacy issue because?
    They can tell companies how much you spent on rival products
    They monitor your activities to force you to buy goods
    They personalise websites for you, including targeting advertisements which you may not want
    They monitor your location to keep a track off you
    45s
    3.7.1
  • Q12
    What are computer based implants?
    A device that can be implanted into your computer
    A device that can be implanted into your rubbish bin
    A device that can be implanted into the body of a human or animal
    A device that can be implanted into your smartphone
    45s
    3.7.1
  • Q13
    What are computer based implants being more commonly used for?
    Trackers for humans
    Built in headsets for humans
    All of these
    ID chips for human beings
    45s
    3.7.1
  • Q14
    What could be included in meta data?
    Instagram stories
    Personal texts
    Snap chat images sent
    All of these
    45s

Teachers give this quiz to your class