Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
39 views2 pages

Chapter 8 Past Paper

Uploaded by

anzala kashif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

Chapter 8 Past Paper

Uploaded by

anzala kashif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CHAPTER 8-SAFETY AND SECURITY

PAST PAPER
1. John has realised that his younger sister is using social media websites. During her use she may
reveal personal data.
(I)Explain what is meant by personal data.
2. Describe the strategies that John would suggest to his sister so that she can minimise the
potential dangers whilst using social media websites.
3. As our use of the internet increases e-safety becomes essential. Discuss why e-safety is needed
4. Name three physical safety issues associated with the use of ICT equipment, and for each one,
suggest a possible method to help to prevent the issue. The methods should be different in each
case.
5. E-safety is very important when using the internet. It is very easy to accidentally reveal personal
data to others when using social networking sites.
Describe three strategies, giving reasons for each one, which you would take to avoid revealing
personal information when using social networking sites.
6. Biometrics are now commonly used to increase the security of computer system access.
Discuss the effectiveness of using biometric methods to increase security
7. An office worker is about to open an attachment but is worried it might contain a computer
virus.
Explain what is meant by a computer virus.
8. A student has handed in her homework. One of the incorrect answers she gave was that
encryption could be used to stop an unauthorised person accessing a computer system.
Explain what is meant by encryption and why it is used.
9. Identify a method which would help to prevent unauthorised access to a computer.
10. Phishing and pharming can affect the security of a user’s data.Compare and contrast phishing
and pharming.
11. Smishing is another security issue. Describe the methods which can be used to help prevent
smishing.
12. Most data protection acts include the principle that data should be accurate and, where necessary,
kept up to date.List four other principles of a typical data protection act.
13. Smishing and phishing can affect the security of a user’s data. Compare and contrast smishing
and phishing.
14. Describe the methods which can be used to help prevent phishing.
15. There have been a number of incidents where laptop computers containing highly sensitive data
have been left on trains. Manufacturers are now developing new ways of protecting laptop
computers and their data.
Discuss the effectiveness of different methods which could be used to protect the data.
16. Data stored on a computer system is at risk of being hacked.
Explain what is meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.
17. Describe three measures that could be taken to protect the data from being hacked
18. Write down three rules that should be applied when setting a strong password.
19. Describe safety measures that should be taken by gamers to ensure their data is safe other than
using strong passwords.
20. Students in Tawara College are using the internet to find information for a project. They have
been told that the college has a firewall.
Explain what is meant by a firewall and why it is used.
21. Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.
Explain why this is not very secure.
22. Instant messaging involves users sending text messages to each other.
Evaluate how you would use eSafety strategies in your own use of instant messaging.
23. One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware has
been installed on a computer.

You might also like