You are on page 1of 18

ASIA INTERNATIONAL

SCHOOL
First trimester
Worksheet 2
Grade: 10 B1/G1 Chapter 8 Date: ____________
Safety and Security

1. A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.
(a) Explain, giving other examples, why biometric methods are considered to be a more
secure way of authorising access to the laptop computer rather than typing in passwords.
Ans: Max five from:
• The biometric data is unique to the user
• Biometric data is always with you
• Passwords can be copied/forgotten/guessed/cracked
• Difficult to copy/forge biometric data
• Eliminates shoulder surfing
• Prevents key logging software
Max two from, e.g.: fingerprints, Retina scans, Voice recognition, Iris scans, Handprint
[6]
2. When people use the internet for shopping and banking it is essential that they use a website
that has a secure server.
(a) Describe the features of a web page that identify it as using a secure server.
Ans: Four from:
• The web address should start with https
• There is a closed/green padlock
• When the padlock is clicked a message will state the connection is encrypted/secure
• The web page has a digital/SSL certificate
• The green padlock shows it has an Extended Validation (EV) certificate/CA certificate[4]
(b) As more and more people use smartphones as computer systems, security can be
breached. Smishing and pharming are ways in which data can be compromised on a
smartphone.
Compare and contrast smishing and pharming.

AIS 8. Safety & Security 1


Ans: Max four from: Differences
• Pharming downloads a file/program/malicious code onto the user’s smartphone
• When the user enters a correct website the software redirects them to the fake website
• When the user enters his password/personal data it is sent to the hacker’s computer
• Pharming can be stopped by not downloading .exe, .bat files
• In Smishing the user receives a text message from an unknown person
• In Smishing the user is asked to phone a number/reply to the text/click on a link
• Smishing can be stopped by not replying to unknown text messages
Max three from: Comparisons
• Both are attacks on the smartphone
• Both redirect the user to a fake company/person/fake website
• Both require the user to enter/divulge personal information
• Both obtain/steal personal/your data [6]
3. Phishing and pharming can affect the security of a user’s data.
(a) Compare and contrast phishing and pharming.
Ans: Max four from: Comparisons
• Both use the internet
• Both redirect the user to a fake website
• Both can lead to fraud and identity theft
• Both use websites that look legitimate
• Personal data is compromised
Max four from: Differences
• With phishing emails are sent to the computer
• In pharming malicious code is uploaded to the computer
• In phishing clicking a link sends user to a fake website
• In pharming the code redirects the user to a fake website without their knowledge
• The email in phishing appears to have come from a trusted source
• Website in pharming appears to be genuine
• In pharming spyware can be used to record key presses [6]
(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing
Ans: Six from:
• Avoid clicking on any unknown texts with links
• Avoid clicking links in texts from people you do not know.
• Do not reply to text messages that have asked you about any of your personal
finances/details.
• Report any suspicious activity.
• Be on the lookout for messages that contain the number 5000 or any number that is not a
AIS 8. Safety & Security 2
phone number as this is used by smishers.
• If the text messages urge you for a quick reply then that is a clear sign of smishing.
• Do extensive research before replying to any message.
• There are plenty websites that allow anyone to run searches based on a phone number
and see any relatable information about whether or not a number is legitimate.
• Never call back a phone number that was associated with the text from an unknown
source.
• If the message states ‘Dear user, congratulations, you have won.’ It is a clear sign for
smishing.
• Check the time when the unknown message was sent. If the text message was sent at an
unusual time, then that is another sign of smishing. [6]
5. Smishing and phishing can affect the security of a user’s data.
(a) Compare and contrast smishing and phishing.
Ans: Max five from: Comparisons
• Both use communication devices to collect personal data
• Both require the user to communicate quickly
• Both require the user to enter personal data
• Both use the internet
Max five from: Differences
Smishing:
• fake text messages/SMS are sent to a phone
Phishing:
• fake emails are sent to your computer
• In smishing the user may be asked to make a phone call
• A smishing message is shorter than a phishing email
• Easier to spot a smishing message
• Smishing messages tend to use 5000 in the message [6]
(b) Describe the methods which can be used to help prevent phishing
Ans: Six from:
• Avoid clicking on any unknown emails with links.
• Do not reply to emails that have asked you about any of your personal data.
• Report any suspicious activity.
• If the email urges you for a quick reply then that is a clear sign of phishing.
• Do extensive research before replying to any message, check the domain name/company
name
• If the email is too good to be true, it possibly is a phishing email.
• Check the time when the unknown email was sent. If the email was sent at an unusual
time, then that is another sign of phishing.
AIS 8. Safety & Security 3
• If the to: box has a large number of similar emails to yours then it is phishing
• If there are several grammar mistakes then it is suspicious [6]
6. Data stored in a computer needs to be protected.
Describe what is meant by encryption
Ans: Three from:
• This is the scrambling of data
• Makes the data not understandable/meaningless
• This system uses an encryption key to encrypt the data
• This system uses an encryption/decryption key to decrypt the data
• Protects sensitive data
[3]
7. Smishing, pharming and phishing are three security threats that can occur when using the
internet for shopping.
Tick (√) whether the following statements refer to pharming, phishing or smishing
pharming phishing(√) smishing(√)
(√)
Fake emails are sent to target users √
When the user types in a URL they are directed

to a fake website
Malicious code is installed on the user’s

computer
Fake text messages are sent to the user’s phone √

[4]
9. An office worker is about to open an attachment but is worried it might contain a computer
virus.
Explain what is meant by a computer virus
Ans: A virus is a piece of software/program code
• Programs or program code that replicate with the intention of deleting or corrupting files
• Need an active host program in the target computer or infected OS before they can run
and cause harm
(definition 1 mark)
One from:
• It infects a computer
• Attaches itself to files
• Has the ability to replicate itself
• Computer stop functioning normally or unresponsive
• Delete files and data in the computer
AIS 8. Safety & Security 4
• Corrupt OS making the it slower/crash [2]
10.A student has handed in her homework. One of the incorrect answers she gave was that
encryption could be used to stop an unauthorised person accessing a computer system.
(a) Explain what is meant by encryption and why it is used.
Ans: Four from:
• Scrambling/encoding of data
• Uses encryption software/encryption key
• Requires a decryption/encryption key to unscramble
• Meaningless to the hacker
• Secures data being transferred from computer to computer
• Protects sensitive data/prevents personal/confidential data falling into wrong hands [4]
(b) Identify a method which would help to prevent unauthorised access to a computer.
Ans: One from:
• Use of user name and strong password
• Biometrics
• Use of a dongle
• Physical locks
• Firewall [1]
11.John has realised that his younger sister is using social media websites. During her use she
may reveal personal data.
(a) Explain what is meant by personal data
Ans: Four from:
• Personal data is data relating to a living individual/person
• The person can be identified either from the data or from the data in conjunction with
other information.
• Example such as: name, address, date of birth, place of birth, bank details [1 mark for
example]
• The data can be sensitive:
• Example e.g. racial, ethnic, medical, religious, relating to a trade union, mental health,
sexual, relating to criminal offences [1 mark for example] [4]
(b) Describe the strategies that John would suggest to his sister so that she can minimise the
potential dangers whilst using social media websites
Ans: Six from:
• Block and report unwanted users
• Never arrange to meet anyone alone
• Always tell an adult if you plan to meet someone
• Report unwanted/abusive messages

AIS 8. Safety & Security 5


• Meet in a public place if you meet with anyone
• Avoid the misuse of images
• Avoid showing images of her in school uniform
• Avoid showing personal images
• Avoid showing full name/address/personal data
• Use appropriate language
• Respect confidentiality [6]
12.As our use of the internet increases e-safety becomes essential.
Discuss why e-safety is needed
Ans:
• E-safety protects personal data from people who should not have access to it
• Personal data needs to be kept safe so that others cannot use it against us
• Protects sensitive data
• Use of it e-safety protects vulnerable people
• Protects other people’s views
• Example of issues of access to personal data: blackmail / spreading rumours / identity
theft / stalking
• E-safety reduces the risks when using ICT using social media sites, online gaming users
believe they are safe
• E-safety trains users to be responsible on the internet
• Giving out personal information can help predators to find out further details about a
person, such as where they live / where they go to school / used to track the person
• People on the internet may not be what they seem
• Need to be able to block people on the internet
• Need to know how to report problems on the internet
• If we do not use e-safety then users are being put at risk as they will not know the
dangers
• Freedom of speech can be affected
• If we do not apply e-safety approaches we open ourselves up to attack
• Use of netiquette
• Example of sensitive data ethnic origin / religion / political / criminal records / sexual
orientation [8]
13.Phishing, pharming and smishing can affect the security of your data. For each of these
security issues describe the methods which you could use to try to prevent them.
(a) Phishing
Ans: Two from:
• Be careful when opening emails from people you do not know

AIS 8. Safety & Security 6


• Be careful when opening attachments from people you do not know
• Do not click on executable (.exe) files / batch (.bat) files sent to you
• Never give out bank details / PIN / passwords / personal details in an email
• Report any phishing attempts
• Do not respond to emails from addresses you do not recognize [2]
(b) Pharming
Ans: Two from:
• Use anti-spyware to remove pharming code
• Check sites carefully before a link is clicked
• Delay using a link sent in an email as some sites are time related
• Check the URL / web address of the website before you enter personal details
• Make sure you are on a secure website [2]
(c) Smishing
Ans: Two from:
• Never give your bank details / PIN / password/personal details over the mobile phone /
text message
• Ignore text messages from numbers you do not recognise
• Report any smishing attempts
• Never click on links in text messages from unexpected people
• Never phone the phone numbers that are given in a suspect text message [2]
14.Name three physical safety issues associated with the use of ICT equipment, and for each
one, suggest a possible method to help to prevent the issue. The methods should be different
in each case.
Ans: Three Matched pairs:
• Electrocution from spilling drinks
o Use of RCB (Residual Current Breaker)
o Check insulation regularly
o Check equipment regularly
o No drinks or food near ICT equipment
• Fire from sockets being overloaded or equipment overheating
o Use a CO2 fire extinguisher
o Don’t cover IT equipment vents
o Check electrics regularly
o Don’t overload sockets
o Ensure good ventilation
• Tripping over trailing cables
o Use cable ducts
o fasten cables to walls
AIS 8. Safety & Security 7
o use wireless devices
o hide cables under flooring
• Heavy equipment falling could injure someone
o Use strong desks
o Use large desks
o Secure equipment to wall or floor or desk [6]

15.E-safety is very important when using the internet. It is very easy to accidentally reveal
personal data to others when using social networking sites.
(a) Describe three strategies, giving reasons for each one, which you would take to avoid
revealing personal information when using social networking sites.
Ans: Maximum three Strategies and Maximum three matching Reasons:
• Don’t give out personal information to people you do not know they could use it for
identity theft
• Don’t send photos of yourself to people you do not know these could be used to
impersonate/identity theft
• Don’t post photos of yourself on the social media without privacy settings being set
because anyone you don’t know could see the images
• Don’t post photographs that could be linked to you showing images of your
school/school uniform could attract strangers
• Maintain privacy settings to stop non-friends from contacting you/control of who sees
your information
• Only make friends with people you know/known to other friends this stops ‘others’
gaining access to your personal information
• Don’t enter private chat rooms stops the stranger writing inappropriate messages (as other
people are watching)
• Do not post email addresses/real addresses/real name, etc. these could be used to find
information about you/identity theft/stalk you/break in
• Do not reply to or communicate with people you do not know they could extract personal
information from you [6]
(b) Confidential personal data is sensitive data.
Name three items of personal data that could be sensitive data.
Ans: Three from:
• Ethnic/racial origin
• Religion/philosophical beliefs
• Political views/opinions
• Member of a political party
• Member of a trade union

AIS 8. Safety & Security 8


• Sexual orientation/gender
• Criminal record
• Health/medical record
• Genetic data/DNA Biometric [3]
16.Ralph regularly uses social media websites to stay in contact with his friends.
Describe four strategies that he could use to stay safe when using these websites.
Ans: Four from:
• Don't give out personal information such as his address or phone number
• Don’t send pictures of himself to anyone, especially indecent pictures
• Don't open/click on suspicious links/adverts on social media
• Don't become online ‘friends’ with people he does not know/don’t contact/chat to people
you do not know
• Never arrange to meet someone in person who he has only met online
• If anything he sees or reads online worries him, he should tell someone about it/block
them
• Use appropriate language
• Set security so only friends can contact [4]
17.Websites that start HTTPS are secure websites. They use encryption when the data is
transferred.
Explain what is meant by encryption.
Ans: Three from:
• Scrambling of data
• Data cannot be understood by humans if intercepted
• Requires the use of an encryption key/ public key/ key to encrypt
• Requires the use of a decryption key/key/encryption key to decrypt
• Protects sensitive data [3]
18.A school has a computer room containing some laptops and some desktop computers. The
headteacher must consider safety issues.
Identify three of these issues and for each one write down a method which would help the
headteacher minimise the risk. Each method must be different in each case.
Ans: Matched pairs
• Electrocution – 1 mark
One from:
o No drinks/food allowed in the computer room
o Make sure all electrical sockets equipped with RCB/Residual Circuit Breaker
o Cover all loose wires
o Check the equipment regularly

AIS 8. Safety & Security 9


• Fire – 1 mark
One from:
o Use a CO2 fire extinguisher
o One plug for one socket
o Do not overload sockets
o Reduce the need for 4 way adapters
• Tripping over trailing cables – 1 mark
One from:
o Use cable ducts/place cables under carpet
o Fasten cables to the wall
o Use wireless devices
o Organise cables
• Injuries caused by heavy equipment falling off tables – 1 mark
One from:
o Use sturdy tables
o Secure equipment to wall or floor or desk
o Place equipment in the middle of the table [6]
19.Documents that are sent between the two cities are encrypted.
Explain what encryption is and why it is used
Ans: Max two marks from:
• Scrambling / encoding of data / convert plain text to cypher text
• Uses encryption software / key to encrypt it
• Requires a decryption / encryption key / software to decrypt
Max two marks from:
• Meaningless to the hacker
• Secures data being transferred from computer to computer
• Protects sensitive data
To gain full marks the answer must include both explanation and use [3]
20.Using computers can lead to a number of physical safety issues.
Describe four of these types of issue
Ans:
• Electrocution, caused by touching bare wires
• Electrocution caused by spilling liquids food and drink on to computers
• Falling objects can cause injury
• Tripping over loose cables can cause injury
• Fire caused by overloading power sockets
• Fire caused by overheating computers [4]
21.The security of software and data is very important.
AIS 8. Safety & Security 10
Complete the following sentences using the most appropriate word(s) from the list
anti-spyware chip reader coding a dongle encryption
a token quantum cryptography iris scan a password a PIN
(a) An electronic device that plugs into a computer and contains the key for a piece of
software is called a dongle [1]
(b) The scrambling of data is known as encryption [1]
(c) A security process that uses photons to enable secure communication is called
Quantum cryptography [1]
(d) A numeric code that is entered to enable payment to be made for a meal in a restaurant
with a debit card is called a PIN [1]
22.When people use the internet they run the risk of their computers being infected by viruses.
A file, containing a virus, is downloaded from the internet.
(a) Describe the effects the virus could have on their computer’s hard disk.
Ans: Three from:
• Track zero/Zero sector could be erased
• Files/data can be detected/destroyed
• Files/data can be corrupted/damaged
• System files can be corrupted if on the hard disk
• Disk space can fill up
[3]
(b) Explain another way the computer could have become infected with a virus.
Ans: Matched pairs:
• Clicked on/open a spam email
• Opened/downloaded the email attachment/embedded image
• Clicked on a link to a website within the email
• Opening software from a portable device/medium
• Running downloaded files without being checked by up-to-date anti-virus software
• Sharing a portable device /medium without not checking it with an up-to-date anti-virus
software before openin
[2]
(c) An antivirus program is set to fully scan a computer for viruses once a day.
Describe how the antivirus software works during the scan
Ans: Three from:
• Detects a potential virus
• Compares the virus coding with its database
• Alerts the user of the potential virus
• It asks the user if the file can be deleted or not
• Deletes the file and virus
AIS 8. Safety & Security 11
• Isolates/quarantines the infected files on the hard disk so they cannot infect the computer
• Disinfects/ cleans the file [3]
23.A company is setting up an online shopping website. Transactions using the website need to
be secure.
(a) Explain what is meant by Secure Socket Layer (SSL).
Ans: Two From:
• .Secure Socket Layer Communication protocol
• Security technology that establish communication link between the server and the client
• It uses encrypted links to provide a secure channel for communication between the two
devices
• An SSL certificate also includes identifying information about a website, including its
domain name and, optionally, identifying information about the site’s owner
• It ensures all data remains private [2]
(b) Describe the features that you would look for in a browser to indicate it has a secure
connection to a website.
Ans: Two from:
• The URL will start with HTTPS
• A padlock appears as an icon on the web page
• SSL security certificate warning
• The background colour of the URL is set to green [2]
24.Pupils working on a science project use the school network to store and retrieve files. They
log onto the network using individual passwords.
(a) Abisha is using his name as his password.
Give two reasons why this is not a good idea.
Ans:Two from:
• Password is too short
• Easy to guess
• Personal information used in the password
• Doesn’t contain a mixture of upper case, lowercase, numbers or symbols [2]
(b) Give two other pieces of advice the teacher should give regarding the management of
passwords.
Ans: Two from:
• Change passwords regularly
• Use a strong password
• Do not write the password down
• Do not tell anyone else the password
• Must be easy for the user to remember [2]

AIS 8. Safety & Security 12


25.The e-ticket will link to a database containing personal data.
Give two examples of personal data that could be stored.
Ans: Two from:
• Name (first name and surname)
• Address
• Gender
• Date of birth
• Mobile phone number
• Email address [2]
26.A company is concerned that hackers may gain access to its computer system or that it may
be infected by a virus.
(a) Explain what is meant by a virus and how it affects the operation of a computer.
Ans:
• A piece of software/malware
• Has the ability to replicate itself
Max two from:
• It corrupts data in the computer
• Deletes data in the computer
• Fills up memory
• Slows the operation of the computer [3]
(b) When hackers gain access to a computer system they could install key-logging software.
Explain how key-logging software works
Ans: Two from:
• Records every keystroke on the keyboard
• Saves it in a log file
• Transmits the log file back to the hackers
• Can read a password being typed in
• The person is unaware it is happening [2]
27.Sukhjit has just discovered a large amount of spam emails in her inbox and is worried it may
be a phishing attempt.
(a) Explain some other dangers of opening spam emails.
Ans: Any three from:
• Spam email may contain viruses/spyware/malware/key loggers
• An example of what viruses/spyware/malware/key loggers/pharming can do
• If you open and reply to spam emails then the spammer knows the email address is active
• Spam can fill up the inbox [3]
Spam is sometimes associated with phishing emails.

AIS 8. Safety & Security 13


(b) Describe how Sukhjit would recognise a phishing email.
Ans: Any four from:
• Check the name of sender matches the content of the email
• Check any URL link matches the content of the email
• Might contain grammar/spelling mistakes
• Check plain text
• Check the message is not an image
• Check if the message is asking for personal information
• Might contain unexpected attachments
• Urgent/too good to be true
• Not address the user by name/generic name used
• Might be in your SPAM emails/alerted by service provider [4]
28.Dhanesh has accidentally downloaded a file containing a virus.
(a) Describe the possible effects on Dhanesh’s computer system if he opens the file.
Ans: Any two from:
• Replicates itself and can fill the computer’s memory/hard disc with unwanted data
• Can communicate with other systems
• Causes computer to crash
• It can delete/corrupt data
• Causes the computer operations/system/processes to run slowly/become unusable
• Makes software/OS unusable
• Can corrupt/erase contents of hard disc [2]
(b) Describe how Dhanesh can help prevent his computer from downloading viruses from the
internet.
Ans: Any three from:
• Run up to date anti-virus software/Install anti-virus software
• Do not download files/attachments from email addresses that you do not recognise
• Do not download files/games/software from untrusted/unfamiliar website
• Scan all emails before opening
• Check/scan attachments to emails for viruses
• Avoid opening spam emails [3]

29.When using the internet it is easy to accidently give your personal details to others.
(a) Give two examples of personal data
Ans: Any two from

AIS 8. Safety & Security 14


• Family name
• Gender
• Nationality
• Religion
• Address
• Phone number
• date of birth
• Email address
• Bank details
• Medical history
• Ethnic origin
• Membership of a political party
• Criminal activity
• Membership of a trade [2]
(b) Describe ways of protecting your personal data when using the internet
Ans: Any five from :
• Use of strong passwords
• Regularly changing passwords
• Not replying to emails where personal data is asked for unless you are sure of the
recipient
• Use of different passwords for different emails/logins
• On social media not giving full name, picture etc.
• Setting social media to private
• Use an alias on online gaming
• Only send personal data on protected sites using https
• Using encryption techniques/TLS/SSL/Digital certificates [5]
30.A student is designing a web page about herself which she plans to publish on the internet.
The web page will contain a picture of herself as well as other details.
She has been advised by her teacher that she needs to be aware of e-safety.
Describe the e-safety issues that she should be aware of before she publishes this web page
Ans: Any four from:
• She should not display pictures of herself in school uniform
• She should not display personal details it could lead to identity theft
• She should not identify the school
• She should make sure the picture is not too revealing
• She should use appropriate language it can lead to cyberbullying
• Should not post her email address/contact details she should be aware that everyone has

AIS 8. Safety & Security 15


access to published data
• Allow she should be aware of identity theft
• Allow she should be aware of online sexual exploitation [4]
31.Key-loggers are thought to be security risks but they can be used to monitor and track the
use of employees on a computer system.
(a) Describe how a key-logger monitors computer usage.
Ans: Any two from:
• A key-logger records the key strokes of a person using the computer
• Transfers / transmits the data back to the supervisor / manager
• The supervisor can then monitor what the employee has been doing / how hard they have
been working [2]
(b) A small minority of employees in a company have been using the computers for non-
business use, so the company has had to introduce other methods of monitoring their use
of ICT.
Apart from key-logging list three other ways that employees could be monitored in their
use of ICT.
Ans: Any three from:
• Monitoring phone call usage
• Monitoring emails
• Monitoring the time spent on and websites visited
• Monitoring the use of printers / number of copies
• Monitoring where employees log in / log out
• Monitoring failed log ins
• Monitor the amount of storage space used
• Monitoring where they send data to print
[3]
32.Computers can be subject to hacking.
Explain what is meant by hacking and the effect it can have on the data or the computer
Ans:
• Unauthorised access to computer systems (1 mark)
Any one from:
• Data on the computer system can be corrupted, edited, deleted, viruses added
• Data on the computer system can be copied/stolen/misused
• Data on the computer system can be accessed/read [2]
33.One popular reason for young people using the internet is playing online games. One way of
ensuring that young people are safe is to use fictional names to identify themselves.
Describe other measures that should be taken to ensure that playing online games is safe for
young people.
AIS 8. Safety & Security 16
Ans: Four from:
• Be vigilant of others attempting to gain access to your data
• Use up to date internet security software like antivirus, anti-spyware, firewall Avoid
giving out personal data (not name) e.g. password, home address, email, age,
(mobile)phone number
• Be aware of addiction e.g. playing for too long
• Be aware of hidden costs« «read terms and conditions
• Play authorised games that have a licence/trusted sites
• Choose a user name that does not contain personal information
• Use strong passwords
• Keep the game up to date
• Do not use identifiable images [4]
34.Data transmitted through the World Wide Web can be protected by encryption.
(a) Explain what is meant by encryption of data
Ans: Any three from:
• Scrambling of data
• Converting data into an unreadable form
• Protects sensitive data
• Requires an encryption key/decryption key/key to encrypt data
• Requires a decryption key/encryption key/public or private keys to decrypt data [3]
(b) Explain what is meant by a digital certificate
Ans: Any two from:
• Allows people/organisations/computers to exchange secure information over the internet
• Uses a PKI (Public Key Infrastructure)
• Unique key used by the sender and receiver [2]
35.The internet has a number of security issues.
Tick whether the following statements would apply to Phishing, Pharming or Smishing.

Phishing Pharming Smishing


(√) (√) (√)
The sending of fraudulent emails appearing to come from

legitimate companies in order to steal passwords
Redirecting users to a bogus website that looks authentic √
Security attack where a user is tricked into downloading a

virus on to a cell phone
As the user types details they are stored by the criminal √
[4]

AIS 8. Safety & Security 17


36.Using the images below write down the Safety issue referred to and a way of Minimising
the risk
Image Safety Issue Minimise the risk

• Use covered cable runs


• Tie cables to wall
Tripping over
• Cover cables with carpet
trailing wires/cables
• Use wireless devices
• Organize wires

• Do not take drinks/food into


Electrocution from
computer room
spilling drinks
• Keyboard covers

• One plug per socket/reduce


Fire from
the load on the socket
overloaded sockets
• Use of RCB

• Use of CO2 fire extinguishers


Fire from
• Fans and cooling from open
overheating
windows/ god ventilation

[8]

AIS 8. Safety & Security 18

You might also like