Académique Documents
Professionnel Documents
Culture Documents
Describe four strategies that you could use to minimise the dangers of using social networking
sites to make new friends.
Any four from:
The action of sending emails to fraudulently obtain another person’s bank details is called
The action of illegally installing malicious code which redirects a person to a fraudulent website with
the purpose of obtaining that person’s bank details is called
(b) ....................................................Pharming.................................................................... [1]
The action of sending text messages to fraudulently obtain another person’s bank details is called
(d) .....................................................Smishing..................................................................... [1]
3. John is working on a school History project and saves his work. He is told by one of his teachers
that the school network has been infected by a computer virus.
(a) Explain what is meant by a computer virus and give examples of how a computer virus can affect
a computer.
Max two from:
A virus is a piece of software/program code that infects a computer
…attaches itself to files
…and has the ability to replicate itself.
(b) John copies his History project from the school network onto his home computer using a pen
drive. There are many ways his home computer can become infected by a computer virus.
Describe three ways in which John could protect his home computer from being infected.
Three from:
Scan the pen-drive as it is inserted into his computer
Use an anti-virus software to scan his computer hard drive
Do not use media from an unknown source
( c) The computer virus has attached itself to a file that John does not want to delete. Describe what
John should do to remove the threat of the computer virus infecting other files
Two from:
Identify the virus using anti-virus software/scan the file
Delete the virus/clean/disinfect the file
4. A teacher is allowing her students to use the internet, including emails, to find information for a
Geography project.
(a) Describe three strategies that students should use to stay safe when on the World Wide Web.
Three from:
Only use websites recommended by the teacher
Only use websites ending in .gov, .ac, .org, .edu
Use a learner friendly search engine
(b) Describe three strategies that students should use to stay safe when sending and receiving
emails.
Three from:
Only email people already known to you/do not reply to spam emails
Never use personal details in emails
Scan all attachments before downloading them/do not open attachments from unknown people
5. There are several security issues surrounding the use of smartphones. These include smishing
and pharming.
(a) Describe different security measures that can be put into place to stop smishing or
pharming attacks.
Smishing
One from:
Never respond to any of these types of texts
Never click on any links within the text message
Pharming:
One from:
Check address bar for strange web addresses
Use up to date firewall services on DNS servers
(b) Cookies are sometimes seen as a security threat when in reality they are only a nuisance.
Explain, using an example, what cookies are and why they are important to companies.
One from:
A small text file sent/downloaded to a user’s web browser when they visit a web site [1]
Two from:
Remember the user’s details
Remember items a user bought
Remember passwords
6. Sukhjit has just discovered a large amount of spam emails in her inbox and is worried it may be a
phishing attempt.
(a) Explain some other dangers of opening spam emails.
Any three from:
Spam email may contain viruses/spyware/malware/key loggers…
… an example of what viruses/spyware/malware/key loggers/pharming can do
If you open and reply to spam emails then the spammer knows the email address is active
Spam can fill up the inbox
(b) Spam is sometimes associated with phishing emails.
Describe how Sukhjit would recognise a phishing email
(b) Describe how Dhanesh can help prevent his computer from downloading viruses from the
internet.
(b) A small minority of employees in a company have been using the computers for non-
business use, so the company has had to introduce other methods of monitoring their use of
ICT.
Apart from key-logging list three other ways that employees could be monitored in their use
of ICT.
10. Discuss the effectiveness of different methods which could be used to prevent unauthorised
access to a laptop computer