0% found this document useful (0 votes)
22 views

Revision Worksheet ICT Year 9 -Answerkey

The document provides an answer key for Year 9 ICT questions, covering topics such as pharming, data protection methods, and online safety measures. It includes explanations of encryption, user ID and password significance, and the differences between functions and formulas in Excel. Additionally, it addresses hacking, its effects, and protective measures, as well as considerations for presentations based on audience type.

Uploaded by

momi.bnq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Revision Worksheet ICT Year 9 -Answerkey

The document provides an answer key for Year 9 ICT questions, covering topics such as pharming, data protection methods, and online safety measures. It includes explanations of encryption, user ID and password significance, and the differences between functions and formulas in Excel. Additionally, it addresses hacking, its effects, and protective measures, as well as considerations for presentations based on audience type.

Uploaded by

momi.bnq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

ARAB UNITY SCHOOL ‫مدرسة الوحدة‬

DUBAI, UAE.
‫العربية‬
‫ م‬.‫ ع‬.‫دبي – ا‬.
Year 9 ICT Answer key
1. Explain what is meant by Pharming.
Pharming is malicious code installed on a user’s computer or on a web server

2. Describe three methods of minimizing the possibility of protecting data online.


■ Firewalls - A firewall can be software or hardware. It sits between the user’s computer and an external
network (for example, the internet).
■ Biometric - Biometrics relies on certain unique characteristics of human beings.
Examples include:
 fingerprint scans
 signature recognition
 retina scans
 iris recognition
 face recognition
voice recognition
■ Two-factor authentication - Authentication refers to the ability of a user to prove who they are.
There are three common factors used in authentication:
 something you know (for example, a password or PIN code)
 something you have (for example, a mobile phone or tablet)
 something which is unique to you (for example, biometrics).

■ Digital certificates - A digital certificate is a pair of files stored on a user’s computer – these are used to
ensure the security of data sent over the internet. Each pair of files is divided into:
 a public key (which can be accessed by anyone)
a private key (known to the computer user only
3. i.Fire Two from:
CO2 fire extinguisher
Don’t overload sockets Have fans/cooling system
Use Residual Circuit Breaker/RCB

ii.Electrocution
Don’t bring drinks close to computers
Cover/insulate live/bare wires
4. Type in =d3/c3
*100
OR
Type in =d3/c3 in e3
Set the format to %
5. The benefit of being connected to the Internet is that information can be sent from head office to the
different branches. Some of this information will need to be encrypted.
a. What is meant by encryption?
1
Two from:
changes data so that it appears to be meaningless
needs a decryption key to be understood
b. Explain why encryption is needed.
Two from:
provides security for sensitive data
protects against results of unauthorised access
6. A common use of home computers is online gaming.
(a) Describe three E-Safety measures which should be taken when playing games on the internet.

Three from:
Report/block cyberbullies
Respect other players
Check game ratings for age
Reduce the amount of time spent gaming
Be careful of in-app purchases
Turn on privacy settings
Don’t use your real name//use a nick name
Don’t give away personal information
(b) In order to log onto online gaming a user ID and password is needed.
Explain what is meant by a user ID and password and why they are needed.
Max two from:
Part of the authentication system
Needed to improve security

Max two from:


Combined they are unique
User ID is an identifier for the user
Password is a string of characters
Passwords verify the user in the authentication process
7. (a) Explain, in detail, what the formula in G2 does.
Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and Name
Finds the corresponding value from the 2nd column
Displays the value in G2 Finds exact match

(b) Explain, using examples, the differences between a function and a formula.
Max two from:
Formula
A formula is a statement written by the user
A formula is an equation
A formula can contain values/references to cells/defined names
A formula can contain functions
One mark Examples =A1+B1, =SUM(A2:B2)

Max two from:


Function
2
A function is a named piece of code designed to calculate specific values Functions are used inside
formulas
A function is a built in/predefined operation
One mark Examples SUM/AVERAGE etc
8. Tick (✓) whether the following are examples of personal data.
YES NO
Full name √

Capital of England √

Gender √

Number of flowers in a garden √

9. Data stored on a computer system is at risk of being hacked.


a. Explain what is meant by the term hacking. Include in your answer two examples of the effects this can
have on the computer system.
b. Describe three measures that could be taken to protect the data from being hacked.
Gaining unauthorised access to a computer system – 1 mark
Two from: Examples
Can lead to the identity theft of data
Can lead to the misuse of/access to personal data
Data can be deleted
Data can be changed
Data can be corrupted
Place malicious files/software
Three from:
Use of firewalls to block unauthorised computer systems
Use of passwords
Use of intrusion detection software/anti-spyware
Use two-factor authentication
Switch off WiFi/computer when not in use
10. Explain in detail the function =ROUND(1.88,0) and write the expected result.
It would take the value of 1.88 – 1 mark
Changes the value into an integer/zero decimal places – 1 mark
The expected result is 2
11.

3
12. A programmer is developing a presentation of a new ICT solution for a conference and needs to
consider the audience.
(a) Using examples, explain why presentations and ICT solutions have to take into account the type
of audience.
(b) The programmer is concerned that the software used for the presentation will be copied by the
participants during the conference. Describe how the software could be protected from illegal
copying.
a)
 The audience could be young
 The audience may be teenagers
 The audience may be old
b) Max three from:
 The solution must match the age of the audience
 More images, sounds, interactive with younger
 More words for the older/adults
 The audience experience may be greater
 More content is needed for younger people to those who are older
 Expectations from the audience may be different
 An audience of experts would expect more from a solution
 More explanation needed from someone who is not an expert

You might also like