Topic 3 QA4
Topic 3 QA4
Q1.
Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).
Q2.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Which one of these is a network hardware device that can prevent DDOS attacks on the booking system?
(1)
A Firewall
B Hub
C Repeater
D Router
Q3.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
B Enhances accessibility
C Improves privacy
Q4.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
B Increases storage
C Quicker backup
D Secures data
(Total for question = 1 mark)
Q5.
Answer the questions with a cross in the boxes you think are correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q6.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q7.
Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).
Which one of these describes safe practice when using online systems?
(1)
A Acknowledging sources
B Anonymising posts
C Avoiding copyright
D Paraphrasing
Answer the question with a cross in the boxes you think are correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q9.
Goods can be purchased in the stores or online via the company website.
(ii) A strong password will help prevent others from accessing his Atzform account.
State two ways he could keep his password secure.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
(iii) In order to complete the setup of his account Iqbal is shown this test.
Which one of these statements is correct?
The test is used to:
(1)
A check that Iqbal's password is correct
B allow automated password generation
C prevent automated sign-up scripts
D ensure that Iqbal's keyboard is working properly
Q10.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Customers can store a digital ticket to their smartphone and access the venue by scanning their phone.
(i) Which one of these is the wireless technology used during this scan?
(1)
A 4G
B Bluetooth
C NFC
D Wi-Fi
(ii) Explain why the venue must also provide customers with the option to print tickets.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q11.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q12.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Which one of these describes data that is given stronger legal protection?
(1)
A Data that is inaccurate
B Data that must be kept for 10 years or more
C Data that must be protected against unlawful processing
D Data that relates to religious beliefs
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q14.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q15.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Q16.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Which one of these is a method Kasuni could use to avoid plagiarising content?
(1)
A Bias check
C Paraphrasing
D Efficient search
Q17.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
B Wiki
C VLE
Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
(iii) State two ways a local area network (LAN) is different from a wide area network (WAN).
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(v) Draw one straight line from each method of protecting a network to the correct use.
(3)
(vi) Which one of these connects to a local area network using a gateway?
(1)
A Personal area network
B Server
C Smartphone
D Wide area network
Q19.
(i) Describe one key feature of a wiki that is different from the key features of a forum.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) Describe one way an acceptable behaviour policy will benefit an online community.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(iii) Describe how one feature of an online community can be used to check that an acceptable behaviour
policy is being followed.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q20.
List three other methods she could use to prevent unauthorised access to her data.
(3)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
3 ..........................................................................................................................................
.............................................................................................................................................
Q21.
Sachini and Ashan have two children, Kasuni and Deshan.
They use digital devices in their daily lives.
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q22.
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q23.
2 ..........................................................................................................................................
Q24.
List two ways Sachini can reduce the risk of developing repetitive strain injury (RSI).
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q25.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
(i) Explain one advantage of using Media Access Control (MAC) addresses rather than Internet Protocol
(IP) addresses to identify devices on a local area network.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) State two issues caused by not identifying devices correctly on a network.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(v) Draw one straight line from each method of protecting a network to the correct description.
(3)
(vi) Which one of these is an example of a device that connects using a personal area network?
(1)
A Hard drive
B Router
C Server
D Smartphone
Q26.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Some users meet people online who have a narrower range of views than people they meet in real life.
.............................................................................................................................................
(ii) Explain two other negative impacts of increased access to the Internet.
(4)
1 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(iii) Which one of these is used by social networks to improve the safety of users?
(1)
A Customised avatars
B Moderators
C Time-limited posts
D User ratings
Q27.
(i) List two other types of online community that Nihal could use to find out more about the hotel.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
(ii) Describe one way Nihal could evaluate if a review is trustworthy.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q28.
Camille uses ICT to organise her family life and her children use ICT for school.
Camille's child, Sarah, uses websites and video sharing sites for her school work.
State one way of reducing the environmental impact of the use of servers that host online services.
(1)
.............................................................................................................................................
.............................................................................................................................................
Q29.
The company that Pat works for allows staff to work from home.
(i) State two other benefits to Pat of being able to work from home.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
(ii) Describe one benefit to the company of staff working from home.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q30.
Goods can be purchased in the stores or online via the company website.
2 ..........................................................................................................................................
.............................................................................................................................................
3 ..........................................................................................................................................
.............................................................................................................................................
(ii) State two legal rights that Iqbal has in relation to his personal data stored by Atzform.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q31.
James teaches in a school that uses a local area network and a wide area network.
One type of backup procedure the school could use is incremental backup.
State one other backup procedure the school could use to secure its data.
(1)
.............................................................................................................................................
.............................................................................................................................................
Q32.
.............................................................................................................................................
(Total for question = 1 mark)
Q33.
State one way the use of batteries can damage the environment.
(1)
.............................................................................................................................................
.............................................................................................................................................
Q34.
Josef uses social networking sites to keep in touch with his friends.
State two problems that can arise from the use of social networking.
For each problem state one action that Josef can take to minimise the risk.
(4)
Problem 1
.............................................................................................................................................
Action
.............................................................................................................................................
.............................................................................................................................................
Problem 2
.............................................................................................................................................
Action
.............................................................................................................................................
.............................................................................................................................................
Q35.
Camille uses ICT to organise her family life and her children use ICT for school.
Camille buys extra online storage.
(i) State two protocols that could be used to secure online payments.
(2)
1 ..........................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
(iii) After Camille enters her password correctly, she receives this text message from her bank.
Explain why this message helps keep Camille's payments secure.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q36.
The Internet has provided a wider range of entertainment and leisure opportunities.
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q37.
State two key features of a blog that are different from the key features of a website.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q38.
Goods can be purchased in the stores or online via the company website.
(i) State three ways in which his web browser indicates that the website is secure.
(3)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
3 ..........................................................................................................................................
.............................................................................................................................................
(ii) State the method used to secure data transmitted to and from a website.
(1)
.............................................................................................................................................
.............................................................................................................................................
Mark Scheme
Q1.
Q2.
Q3.
Q4.
Q5.
Q6.
Q7.
Q8.
Q9.
Q10.
Q11.
Q12.
Q13.
Q14.
Q15.
Q16.
Q17.
Q18.
Q19.
Q20.
Q21.
Q22.
Q23.
Q24.
Q25.
Q26.
Q27.
Q28.
Q29.
Q30.
Q31.
Q32.
Q33.
Q34.
Q35.
Q36.
Q37.
Q38.