Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

C1 Responsible use GapFill

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

We are sharing more data than ever before. If you read a book written about data from forty years ago, the author might suggest that your personal data may be stored on as many as ten or fifteen different computers. Nowadays, you’ll have dozens of different accounts across different websites, and you’ll leave behind a massive trail of data – some of this data will be anonymised, and some of it won’t. Messages you send and the websites you visit might be logged by someone, whether it is your Internet Service Provider (ISP) or the owner of a search engine.

Social media allows us to generate personal data at a phenomenal rate. For example, we can ‘check in’ to a restaurant or café, or visitor attraction, or we can be shown local adverts or events based on out IP addresses. These are examples of  GPSpublicmaplocation-based data. Checking in is an active share of data because you are the one providing it. But if you are not directly providing that information, then it is  passiveneuraltransactionalneutral. While this data-use can be very useful in our lives, there are also drawbacks and privacy concerns. Really useful examples of location based data might include travel – such as  in-private browsingpredicted travel timesstatic bus timesmobile phones, or GPS navigation. Some might find such a level of data unnecessary, and data could be dangerous in the wrong hands – such as a  burglarpolice officerprivate investigatordoctor who knows that you’re not at home.

Transactional data is generated when you  delete your cookies or browsing historybrowse for local events on social mediacheck-in to a placemake a purchase in a shop or online. All of this transactional data will be printed on the receipt that you are given, such as the goods, value and VAT. Some shops track the items purchased by a user using  a loyalty schemea bank tellerCCTV camerasa webpage. This data allows the shop to send you vouchers for things that you frequently buy, and use the data to profile their shoppers and make sales predictions. However, some users feel that this degree of monitoring is  normalunobtrusivenon-compliantobtrusive.

Websites also track how we interact with a site. They generate small text files that are stored on your device. This reduces the load on web servers. They are called cookies.  Double chocolate chipSessionEthicalPersistent cookies only store the data while you are on the site. For example, it will track the items that you view or add to the basket when doing online shopping. After you’ve finished on the site, this cookie will be  shreddedsold to a third partydeletedretained. The other type of cookie remains after you leave the site. These are called  Double chocolate chipSessionPersistentEthical cookies. While they can be useful, saving you time when you re-visit a site, they can be used to track your activity across the web, and can be used for advertising purposes – showing you products that you viewed on one site in a window on another site.

Organisations are starting to share information between themselves. We call this  datacookieforeignphishing exchange. This is used in both the public and private sectors and can be used for good, but also at the risk of discrimination if  combined information is a disadvantageyou use social mediahelps youyou have two email accounts. The more places that have your data, the more chance of the data being stolen in a breach.

We have to be careful with the use of personal data. For example, the Data Protection Act 2018 in the UK sets out the  socialunlawfultransactionallegal basis for collecting, storing and processing data. When data is stored, it has to be protected so that the data is kept confidential. If the data is not securely stored, or misused, there is a concern over  processinglawfulprivacylocation. Once you have data, the uses and actions must be  unlawfulsharedethicalprivate.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%