Chapter 8 Past Paper
Chapter 8 Past Paper
Chapter 8 Past Paper
GRADE 10 & 11
1. John has realised that his younger sister is using social media websites. During her use she
may reveal personal data.
(I)Explain what is meant by personal data.
2. Describe the strategies that John would suggest to his sister so that she can minimise the
potential dangers whilst using social media websites.
3. As our use of the internet increases e-safety becomes essential. Discuss why e-safety is
needed
4. Name three physical safety issues associated with the use of ICT equipment, and for each
one, suggest a possible method to help to prevent the issue. The methods should be
different in each case.
5. E-safety is very important when using the internet. It is very easy to accidentally reveal
personal data to others when using social networking sites.
Describe three strategies, giving reasons for each one, which you would take to avoid
revealing personal information when using social networking sites.
6. Biometrics are now commonly used to increase the security of computer system access.
Discuss the effectiveness of using biometric methods to increase security
7. An office worker is about to open an attachment but is worried it might contain a computer
virus.
Explain what is meant by a computer virus.
8. A student has handed in her homework. One of the incorrect answers she gave was that
encryption could be used to stop an unauthorised person accessing a computer system.
Explain what is meant by encryption and why it is used.
9. Identify a method which would help to prevent unauthorised access to a computer.
10. Phishing and pharming can affect the security of a user’s data.Compare and contrast
phishing and pharming.
11. Smishing is another security issue. Describe the methods which can be used to help prevent
smishing.
12. Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.List four other principles of a typical data protection act.
13. Smishing and phishing can affect the security of a user’s data. Compare and contrast
smishing and phishing.
14. Describe the methods which can be used to help prevent phishing.
15. There have been a number of incidents where laptop computers containing highly sensitive
data have been left on trains. Manufacturers are now developing new ways of protecting
laptop computers and their data.
Discuss the effectiveness of different methods which could be used to protect the data.
16. Data stored on a computer system is at risk of being hacked.
Explain what is meant by the term hacking. Include in your answer two examples of the
effects this can have on the computer system.
17. Describe three measures that could be taken to protect the data from being hacked
18. Write down three rules that should be applied when setting a strong password.
19. Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.
20. Students in Tawara College are using the internet to find information for a project. They
have been told that the college has a firewall.
Explain what is meant by a firewall and why it is used.
21. Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.
Explain why this is not very secure.
22. Instant messaging involves users sending text messages to each other.
Evaluate how you would use eSafety strategies in your own use of instant messaging.
23. One method that hackers use to find people’s passwords is to install key-logging spyware
onto computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.