Professional Documents
Culture Documents
SCHOOL
First trimester
Worksheet 2
Grade: 10 B1/G1 Chapter 8 Date: ____________
Safety and Security
1. A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.
(a) Explain, giving other examples, why biometric methods are considered to be a more
secure way of authorising access to the laptop computer rather than typing in passwords.
Ans: Max five from:
• The biometric data is unique to the user
• Biometric data is always with you
• Passwords can be copied/forgotten/guessed/cracked
• Difficult to copy/forge biometric data
• Eliminates shoulder surfing
• Prevents key logging software
Max two from, e.g.: fingerprints, Retina scans, Voice recognition, Iris scans, Handprint
[6]
2. When people use the internet for shopping and banking it is essential that they use a website
that has a secure server.
(a) Describe the features of a web page that identify it as using a secure server.
Ans: Four from:
• The web address should start with https
• There is a closed/green padlock
• When the padlock is clicked a message will state the connection is encrypted/secure
• The web page has a digital/SSL certificate
• The green padlock shows it has an Extended Validation (EV) certificate/CA certificate[4]
(b) As more and more people use smartphones as computer systems, security can be
breached. Smishing and pharming are ways in which data can be compromised on a
smartphone.
Compare and contrast smishing and pharming.
[4]
9. An office worker is about to open an attachment but is worried it might contain a computer
virus.
Explain what is meant by a computer virus
Ans: A virus is a piece of software/program code
• Programs or program code that replicate with the intention of deleting or corrupting files
• Need an active host program in the target computer or infected OS before they can run
and cause harm
(definition 1 mark)
One from:
• It infects a computer
• Attaches itself to files
• Has the ability to replicate itself
• Computer stop functioning normally or unresponsive
• Delete files and data in the computer
AIS 8. Safety & Security 4
• Corrupt OS making the it slower/crash [2]
10.A student has handed in her homework. One of the incorrect answers she gave was that
encryption could be used to stop an unauthorised person accessing a computer system.
(a) Explain what is meant by encryption and why it is used.
Ans: Four from:
• Scrambling/encoding of data
• Uses encryption software/encryption key
• Requires a decryption/encryption key to unscramble
• Meaningless to the hacker
• Secures data being transferred from computer to computer
• Protects sensitive data/prevents personal/confidential data falling into wrong hands [4]
(b) Identify a method which would help to prevent unauthorised access to a computer.
Ans: One from:
• Use of user name and strong password
• Biometrics
• Use of a dongle
• Physical locks
• Firewall [1]
11.John has realised that his younger sister is using social media websites. During her use she
may reveal personal data.
(a) Explain what is meant by personal data
Ans: Four from:
• Personal data is data relating to a living individual/person
• The person can be identified either from the data or from the data in conjunction with
other information.
• Example such as: name, address, date of birth, place of birth, bank details [1 mark for
example]
• The data can be sensitive:
• Example e.g. racial, ethnic, medical, religious, relating to a trade union, mental health,
sexual, relating to criminal offences [1 mark for example] [4]
(b) Describe the strategies that John would suggest to his sister so that she can minimise the
potential dangers whilst using social media websites
Ans: Six from:
• Block and report unwanted users
• Never arrange to meet anyone alone
• Always tell an adult if you plan to meet someone
• Report unwanted/abusive messages
15.E-safety is very important when using the internet. It is very easy to accidentally reveal
personal data to others when using social networking sites.
(a) Describe three strategies, giving reasons for each one, which you would take to avoid
revealing personal information when using social networking sites.
Ans: Maximum three Strategies and Maximum three matching Reasons:
• Don’t give out personal information to people you do not know they could use it for
identity theft
• Don’t send photos of yourself to people you do not know these could be used to
impersonate/identity theft
• Don’t post photos of yourself on the social media without privacy settings being set
because anyone you don’t know could see the images
• Don’t post photographs that could be linked to you showing images of your
school/school uniform could attract strangers
• Maintain privacy settings to stop non-friends from contacting you/control of who sees
your information
• Only make friends with people you know/known to other friends this stops ‘others’
gaining access to your personal information
• Don’t enter private chat rooms stops the stranger writing inappropriate messages (as other
people are watching)
• Do not post email addresses/real addresses/real name, etc. these could be used to find
information about you/identity theft/stalk you/break in
• Do not reply to or communicate with people you do not know they could extract personal
information from you [6]
(b) Confidential personal data is sensitive data.
Name three items of personal data that could be sensitive data.
Ans: Three from:
• Ethnic/racial origin
• Religion/philosophical beliefs
• Political views/opinions
• Member of a political party
• Member of a trade union
29.When using the internet it is easy to accidently give your personal details to others.
(a) Give two examples of personal data
Ans: Any two from
[8]