0% found this document useful (0 votes)
15 views

Topic 3 QA4

The document contains a series of multiple-choice and open-ended questions related to ICT, online safety, and data protection. It addresses various topics such as sustainability, network security, password protection, online communities, and the identification of devices on networks. The questions are designed to assess knowledge and understanding of these concepts in a structured format.

Uploaded by

8cj2w8gjys
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Topic 3 QA4

The document contains a series of multiple-choice and open-ended questions related to ICT, online safety, and data protection. It addresses various topics such as sustainability, network security, password protection, online communities, and the identification of devices on networks. The questions are designed to assess knowledge and understanding of these concepts in a structured format.

Uploaded by

8cj2w8gjys
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 46

Questions

Q1.

Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).

Which one of these reduces sustainability?


(1)
A Sending fewer emails
B Switching off computers when not using them
C Turning down screen brightness
D Using magnetic storage rather than solid state storage

(Total for question = 1 mark)

Q2.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Gail works at a concert venue.

The staff at the venue use ICT for work.

The concert venue uses an online booking system.

Which one of these is a network hardware device that can prevent DDOS attacks on the booking system?
(1)
A Firewall
B Hub
C Repeater
D Router

(Total for question = 1 mark)

Q3.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Which one of these is a reason to use an avatar?


(1)
A Adds security

B Enhances accessibility

C Improves privacy

D Prevents social interaction

(Total for question = 1 mark)

Q4.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Judy sets file permissions on her online documents.

Which one of these is a benefit of doing this?


(1)
A Improves encryption

B Increases storage

C Quicker backup

D Secures data
(Total for question = 1 mark)

Q5.

Answer the questions with a cross in the boxes you think are correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Kay uses a range of software.

Kay uses software to protect her from risks online.

(i) Which one of these is an example of phishing?


(1)
A Email pretending to be from a bank
B Encrypting data
C Redirecting web traffic to a fake site
D Website code copied without permission

(ii) Which one of these is a risk of phishing?


(1)
A Connectivity fault
B Data deletion
C Fraudulent activity
D Power reduction

(Total for question = 2 marks)

Q6.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Gail works at a concert venue.

The staff at the venue use ICT for work.


Which one of these causes a risk to online safety?
(1)
A Bookmarking
B Legislation
C Misrepresentation
D Vlogging

(Total for question = 1 mark)

Q7.

Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).

Which one of these describes safe practice when using online systems?
(1)
A Acknowledging sources
B Anonymising posts
C Avoiding copyright
D Paraphrasing

(Total for question = 1 mark)


Q8.

Answer the question with a cross in the boxes you think are correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Ruwan searches online for local sporting events.

Which one of these is a protocol used to transfer data on the Internet?


(1)
A ISP
B HTTPS
C HTML
D VPN

(Total for question = 1 mark)

Q9.

Atzform is a retailer with stores across the UK.

Goods can be purchased in the stores or online via the company website.

Iqbal has decided to set up an account on the Atzform website.

(i) He is prompted to set up a user name and password.


Which one of these would provide the strongest password?
(1)
A Iqbal1987s
B 19SeN#8tM
C 19IqBal#87
D IqBal1987

(ii) A strong password will help prevent others from accessing his Atzform account.
State two ways he could keep his password secure.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(iii) In order to complete the setup of his account Iqbal is shown this test.
Which one of these statements is correct?
The test is used to:
(1)
A check that Iqbal's password is correct
B allow automated password generation
C prevent automated sign-up scripts
D ensure that Iqbal's keyboard is working properly

(Total for question = 4 marks)

Q10.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Gail works at a concert venue.

The staff at the venue use ICT for work.

The concert venue uses an online booking system.

Customers can store a digital ticket to their smartphone and access the venue by scanning their phone.

(i) Which one of these is the wireless technology used during this scan?
(1)
A 4G
B Bluetooth
C NFC
D Wi-Fi

(ii) Explain why the venue must also provide customers with the option to print tickets.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)

Q11.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Kay works from home.


She uses ICT for business and entertainment.
Which one of these could prevent the risk to Kay's work data caused by accidental deletion?
(1)
A Anti-malware
B Backup
C Encryption
D Phishing

(Total for question = 1 mark)

Q12.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Gail works at a concert venue.

The staff at the venue use ICT for work.

Which one of these describes data that is given stronger legal protection?
(1)
A Data that is inaccurate
B Data that must be kept for 10 years or more
C Data that must be protected against unlawful processing
D Data that relates to religious beliefs

(Total for question = 1 mark)


Q13.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Kay can access goods and services online.

Which one of these describes people who are 'information poor'?


(1)
A Limited access to technology
B Phishing victims
C Rural communities using 4G technology
D Write access, rather than read access

(Total for question = 1 mark)

Q14.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Nihal travels for work and holidays.


He uses ICT to plan his travel and for entertainment.
Which one of these describes unsafe practice when using online systems?
(1)
A Anonymising posts
B Copyrighting video
C Geotagging photos
D Plagiarising text

(Total for question = 1 mark)

Q15.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Hugh sells his music online.

Which one of these is a law that protects his work?


(1)
A Computer Misuse Act

B Copyright, Designs and Patents Act

C Human Rights Act

D Data Protection Act


(Total for question = 1 mark)

Q16.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Kasuni studies online.

Which one of these is a method Kasuni could use to avoid plagiarising content?
(1)
A Bias check

B Copy and paste

C Paraphrasing

D Efficient search

(Total for question = 1 mark)

Q17.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Kasuni studies online.

Which one of these is a user-generated reference site?


(1)
A Social network

B Wiki

C VLE

D Online work space

(Total for question = 1 mark)


Q18.

Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).

Letta arrives at a hotel.

Letta connects to the hotel's local area network.

(i) One way of identifying a device on a network is the device name.


State two other ways of identifying a device on a network.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(ii) State two reasons for identifying devices on a network.


(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(iii) State two ways a local area network (LAN) is different from a wide area network (WAN).
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(iv) Explain one advantage of connecting a printer to a network.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(v) Draw one straight line from each method of protecting a network to the correct use.
(3)
(vi) Which one of these connects to a local area network using a gateway?
(1)
A Personal area network
B Server
C Smartphone
D Wide area network

(Total for question = 12 marks)

Q19.

Letta uses an online travel booking system.

Letta checks some hotel reviews on an online community.

(i) Describe one key feature of a wiki that is different from the key features of a forum.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................
(ii) Describe one way an acceptable behaviour policy will benefit an online community.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(iii) Describe how one feature of an online community can be used to check that an acceptable behaviour
policy is being followed.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 6 marks)

Q20.

Zara uses her tablet computer to watch TV online.

Zara uses a PIN to unlock her tablet computer.

List three other methods she could use to prevent unauthorised access to her data.
(3)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

3 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)

Q21.
Sachini and Ashan have two children, Kasuni and Deshan.
They use digital devices in their daily lives.

Some people cannot go online because of their religious beliefs.

List two other causes of unequal access to ICT.


(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q22.

Deshan buys a music CD in a store.

Online hackers are a threat to Deshan's data.


List two other threats to Deshan's data.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q23.

Judy is researching online.

List two types of user-generated reference sites Judy could use.


(2)
1 ..........................................................................................................................................

2 ..........................................................................................................................................

(Total for question = 2 marks)

Q24.

Sachini plays online games on her laptop.

List two ways Sachini can reduce the risk of developing repetitive strain injury (RSI).
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q25.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Nihal travels for work and holidays.


He uses ICT to plan his travel and for entertainment.

Nihal connects his laptop to the hotel's local area network.

(i) Explain one advantage of using Media Access Control (MAC) addresses rather than Internet Protocol
(IP) addresses to identify devices on a local area network.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(ii) State two issues caused by not identifying devices correctly on a network.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(iii) Complete this sentence by adding the correct network devices.


(2)
A local area network uses a .............................................................. to connect devices,
whereas a wide area network uses a .............................................................. to connect
local area networks.
(iv) Explain one disadvantage of connecting a printer to a network.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(v) Draw one straight line from each method of protecting a network to the correct description.
(3)

(vi) Which one of these is an example of a device that connects using a personal area network?
(1)
A Hard drive
B Router
C Server
D Smartphone

(Total for question = 12 marks)

Q26.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

Nihal travels for work and holidays.


He uses ICT to plan his travel and for entertainment.

Some users meet people online who have a narrower range of views than people they meet in real life.

(i) State one reason for this.


(1)
.............................................................................................................................................

.............................................................................................................................................

(ii) Explain two other negative impacts of increased access to the Internet.
(4)
1 ..........................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................
(iii) Which one of these is used by social networks to improve the safety of users?
(1)
A Customised avatars
B Moderators
C Time-limited posts
D User ratings

(Total for question = 6 marks)

Q27.

Nihal travels for work and holidays.


He uses ICT to plan his travel and for entertainment.

Nihal reads a positive review of the hotel on a social networking site.

(i) List two other types of online community that Nihal could use to find out more about the hotel.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................
(ii) Describe one way Nihal could evaluate if a review is trustworthy.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Q28.

Camille has two children.

Camille uses ICT to organise her family life and her children use ICT for school.

Camille's child, Sarah, uses websites and video sharing sites for her school work.

State one way of reducing the environmental impact of the use of servers that host online services.
(1)
.............................................................................................................................................
.............................................................................................................................................

(Total for question = 1 mark)

Q29.

Pat has a desktop PC at home.

The company that Pat works for allows staff to work from home.

This reduces her travel costs.

(i) State two other benefits to Pat of being able to work from home.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(ii) Describe one benefit to the company of staff working from home.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Q30.

Atzform is a retailer with stores across the UK.

Goods can be purchased in the stores or online via the company website.

The information Iqbal enters is stored by the company.

(i) Atzform must ensure that the data is kept secure.


State three other legal requirements that a company must follow when storing the personal data of
customers.
(3)
1 ..........................................................................................................................................
.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

3 ..........................................................................................................................................

.............................................................................................................................................

(ii) State two legal rights that Iqbal has in relation to his personal data stored by Atzform.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)

Q31.

James teaches in a school that uses a local area network and a wide area network.

One type of backup procedure the school could use is incremental backup.

State one other backup procedure the school could use to secure its data.
(1)
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 1 mark)

Q32.

GPS can be used to monitor people's movements.

State one other way of monitoring people's movements.


(1)
.............................................................................................................................................

.............................................................................................................................................
(Total for question = 1 mark)

Q33.

Nihal travels for work and holidays.


He uses ICT to plan his travel and for entertainment.

State one way the use of batteries can damage the environment.
(1)
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 1 mark)

Q34.

Josef is a student who travels by bus to college.

He uses his smartphone to communicate with his friends when travelling.

Josef uses social networking sites to keep in touch with his friends.
State two problems that can arise from the use of social networking.

For each problem state one action that Josef can take to minimise the risk.
(4)
Problem 1
.............................................................................................................................................
Action
.............................................................................................................................................

.............................................................................................................................................
Problem 2
.............................................................................................................................................
Action
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Q35.

Camille has two children.

Camille uses ICT to organise her family life and her children use ICT for school.
Camille buys extra online storage.

(i) State two protocols that could be used to secure online payments.
(2)
1 ..........................................................................................................................................

2 ..........................................................................................................................................

(ii) State how encryption prevents data from being understood.


(1)
.............................................................................................................................................

.............................................................................................................................................

(iii) After Camille enters her password correctly, she receives this text message from her bank.
Explain why this message helps keep Camille's payments secure.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)

Q36.

The Internet has provided a wider range of entertainment and leisure opportunities.

One example is video and audio streaming.

State two other examples.


(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q37.

Kay uses a range of software.

State two key features of a blog that are different from the key features of a website.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q38.

Atzform is a retailer with stores across the UK.

Goods can be purchased in the stores or online via the company website.

Iqbal knows the Atzform website is secure.

(i) State three ways in which his web browser indicates that the website is secure.
(3)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

3 ..........................................................................................................................................

.............................................................................................................................................
(ii) State the method used to secure data transmitted to and from a website.
(1)
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Mark Scheme
Q1.

Q2.

Q3.

Q4.
Q5.

Q6.

Q7.
Q8.

Q9.
Q10.

Q11.

Q12.

Q13.
Q14.

Q15.

Q16.
Q17.

Q18.
Q19.
Q20.
Q21.

Q22.

Q23.
Q24.

Q25.
Q26.
Q27.

Q28.
Q29.

Q30.
Q31.

Q32.

Q33.
Q34.

Q35.
Q36.

Q37.

Q38.

You might also like