Search Header Logo

IT9626 unit 3 & 5 Test

Authored by Ehtesham Malik

Instructional Technology

12th Grade

Used 1+ times

IT9626 unit 3 & 5 Test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

OPEN ENDED QUESTION

5 mins • 7 pts

In a recent BBC news bulletin it was said: ‘It takes 82 seconds for cyber-thieves to ensnare the first victim of a phishing campaign, a report suggests.’ ‘Hackers exploit router flaws in unusual pharming attack.’ Describe what is meant by:

(a) phishing 4 marks

(b) pharming 3 marks

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

5 mins • 6 pts

Personal data and other sensitive types of data often need to be kept confidential or restricted to authorised staff. Explain why personal data should be kept confidential (6 marks)

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

10 mins • 8 pts

Phishing is an attempt by fraudsters to gather personal information using email. Receivers of emails should use several different methods to prevent phishing attacks. Evaluate the different methods which can be used to prevent phishing (8 marks)

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 7 pts

Hackers sometimes commit fraud after causing spyware to be installed on other users’ computers.

(a) Describe what is meant by the term ‘spyware’ ( 3 marks)

(b)(b) Explain how a hacker uses the information gained from spyware to commit fraud.( 4 marks)

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

5 mins • 6 pts

Sensors are used in monitoring systems to measure physical variables. It is important that sensors are calibrated before use. (a) Describe, in detail, these sensors and give an appropriate use for each. Each use must be different.

a) Humidity (marks 2)

b)Sound (marks 2)

c) Explain the importance of calibration (marks 2)

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 4 pts

Sensors are used in monitoring and control to measure physical variables. (a) Describe these sensors. For each sensor, explain how it could be used in a control system. Each system must be different.

a)Infrared ( marks 2)

b)Ultrasonic (marks 2)

Evaluate responses using AI:

OFF

7.

CATEGORIZE QUESTION

5 mins • 4 pts

Organize these options into the right categories

Groups:

(a) trojan

,

(b) rootkit

,

(c) spyware

,

(d) virus

it looks harmless

it is designed to spread much like human virus

keylogger

in this method peron drops usb so other can take it with curiosity and get victim

designed to gather information about your interactions with your computer

enables to gain adminsitrative access

it distinguish itself as a legitimate software

it infects new files

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?