Where did the great fire of london begin in 1666
Pudding lane
Is murder a common law offence
Yes
What is the name of the organisation that is headquartered in New York and is responsible for global governance
UN
What is the name of the sociologist who developed risk theory?
Beck
What is Phishing?
Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source
Which tribal leader fought against the Roman conquest of Britain
Hadrian
Company directors owe certain statutory duties to their companies - T/F?
True
Which treaty marked the end of WW1
The Treaty of Versailles or Armistace
How did Margaret Thatcher change the British education system?
Marketisation
False.
In addition to GPS, smartphones can be tracked using the mobile phone towers or Wi-Fi networks that the phone is connected to
Which famous document eventually led to the formation of Parliament in England
The Magna Carta
Do physicians still take the Hippocratic oath
No
What types of weapons are weapons of mass destruction
Biological, chemical and nuclear
What was Antonio Gramsci's most well known theory
Cultural hegemony
What does the 'https://' at the beginning of a URL denote, as opposed to 'http://'
The information entered into the site is encrypted
Which Monarch established the Church of England?
King Henry VII
Who regulates environmental requirements?
The Environment Agency
What is the name of the military alliance between north america and europe formed in 1949
NATO
Name an additional branch of feminisim?
Radical, Difference, Marxist...
What name is given to a group of computers networked together and used by hackers to steal information
Botnet
Which Prime Minister oversaw the introduction of the NHS?
Clemett Attlee
Which core Human Rights treaty has been signed by the most countries?
The convention on the Rights of a Child
What is the name of the organisation that focusses on oil policy and brings together several of the worlds leading oil producers
OPEC
Which advisor to Ronald Regan is known for adopting right-realist policies against crime
James Wilson
what is it called when a criminal accesses and encrypts personal files/data on a computer and then asks for payment to decrypt the files?
Ransomware