You are on page 1of 5

5. Write a short note on Wi-Fi and Blue tooth.

 Wi-Fi is a wireless networking technology makes it possible to connect devices with a wireless
connection to a network or to a single computer.
 Bluetooth is a wireless networking technology designed for very short-range connections.

6. In relation to the use of ICT systems, and using an example for each, describe what is meant by

Malpractice and crime.

7. Measures can be taken to protect ICT systems. Explain what measures you would take to protect

An ICT system and why you would take them.

Authentication techniques are used to ensure only authorized users are able gain access to a Network
via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication etc.
8. Discuss the issues that concern people regarding the privacy and security of data in ICT systems.

Identity theft: Identity theft is where someone gets hold of your personal information and then
pretends to be you. They could then go on to commit cybercrimes (like fraud) while posing as you.

Theft of money: If online criminals obtain your bank details or credit card number, they can use that
information to withdraw your cash or make online purchases at your expenses.

Burglary of your home: It has been known that people have been burgled as a result of Facebook
status. Publicity posting dates and times when you are on a holiday can let burglars know your
house is empty and an easy target. It’s almost like saying “Please, rob me”.

Physical harm to yourself: Unfortunately, the internet is sometimes used by people who can only be
described as online predators. This can include pedophiles who deliberately look for and target
children. Posting personal data online such as your age or an image of yourself in a school uniform
can attract online predators.

9. Describe, using an example for each, what is meant by an internal threat and an external threat to?

An ICT system?

Threats that would come from inside the organization are called internal threats and those coming
from the outside the organization are called external threats. For example, hacking would normally be
considered as external threat, because hacking involves obtaining access to a computer system using
communication links (usually the internet). However, if a person employed by the organization
wanted to gain access to a part of ICT system they were not normally used to access, then this is also
hacking and would be considered as internal threat.

10. Do you think the Internet should be policed or controlled? Give reasons to support your answer.

 Internet should be policed:


 It would prevent illegal material posted on websites (e.g.: racist, prejudice,
pornographic, terrorist activities, etc.)
 Some form of control would prevent children and other vulnerable groups being
subjected to undesirable websites
 Some form of control would stop incorrect information being published on websites.
 To bring justice to those users who continually misuse the internet for their own
personal gain.
 Internet should not be policed:
 It would be very expensive to police every website and users would have to pick up the
bill.
 It would be difficult to enforce rules and regulations on a global scale.
 It could be argued that policing would go against freedom of information.
 Infrastructure including staffs and office would be required

11. Discuss briefly any two purposes for which an intranet can be used.

 Viewing internal web pages (e.g.: company, schools, universities, etc.)


 Sharing of Internal documents

12. Mention at least two similarities and two differences between Wi-Fi and Blue tooth.

Similarities:

 Wi-Fi and Bluetooth both are wireless networking technology.


 They both transfer data at high speed.

Differences:

 WIFI is used in bigger spaces, while Bluetooth is used in a single room.


 Bluetooth is very obstacle sensitive, but WIFI is not.

13. What do you mean by the term Data transmission? What is bandwidth?

Data transmission refers to the process of transferring data between two or more digital devices.
Digital Bandwidth is the maximum amount of data that can travel along a communications channel
in a given time. The smallest piece of digital data is the 'bit' and time interval is measured in
seconds.
14. The two types of transmission technologies available are broadcast and point-to point.

Differentiate between the two.

15. What is a Router? Why do we use it?

•Transfers data between networks (Receives and Sends Data Packets)

•Router can connect to devices using cables or wireless signals.

•It stores information about which computer is connected to which network.

16. Explain authentication and authorization with examples

Authentication is any process by which a system verifies the identity of a user who wishes to access it
such as password and PIN based authentication. Authorization is the process to determine whether the
authenticated user has access to the particular resources. Such as security questions.

You might also like