You are on page 1of 4
LYCEUM INTERNATIONAL SCHOOL Monthly Test — May 2015 Subject Computing Class : Be. Duration : 1 period Date Candidate's nar Admission no: Instructions + + Calculators are NOT allowed, + Use the given spaces to write the answers. + Ink all your answers and diagrams. PARTI line the correct answer. (1) Which of the following is unlikely to damage or delete data? (i) Assystem crash (ii) Making backup copies. (iii) Viruses. (iv) Hackers. (2) Which would be the best method of backing up your data? (i) Take printouts and file them, (ii) Keep another copy of data on the hard disk. (iii) Copy data on to a removable storage device e.g. external hard disk, (iv) Keeping a hand written copy. (3) What method should be used in order to restrict access to office premises? (i) Username and password Gi) Firewall (iii) Door locking mechanisms (iv) Single-user operating system (4) Converting data to a secret code is called ~ () password. (ii) authentication. (ii) authorization, (iv)_ encryption. (5) Which of the following is not a physical data protection method? (i) Door locking (ii) Security guards (ii) Virus guard (iv) Security cameras [Total = 5 marks} contd....to page 2 re) @) Grade 8 Computing contd.....from page 1 PART IL (i) Name one Anti-virus program, (ii) What is the most significant feature of a Trojan Horse? (iii) Write one method that can be used to protect your computer from Trojan Horses. (iv) What is the malware that allows another party to monitor and control your computer? Mark the following statements are true (7 ) or false ( x). (3) Acomputer can get a virus via e-mail (ii) A virus can do physical damage to hardware. (iii) A computer does not need an anti-virus if a firewall is present. (iv) User defined procedures are given by the system administrator (v) Authorization rules restrict, read, edit and delete rights of the user. (vi) Malware are computer programs, (vii) Creating and releasing a virus is a criminal offence GB) [Total = 2 * 7 = 14 marks} In a dental surgery, patients’ data is recorded in the computer. (i) Write two precautions that can be taken to prevent data damage’ lo (@) (b) (2 marks) (ii) Only doctors and nurses who work in the surgery should be able to access this data, Write a security method that can be implemented inside the computer to prevent unauthorized access. (2 marks) comid....t0 page 3 (ai) tiv) 4 0 ay Grade 8 Computing contd.....from page 2 Doctors need to see all the information about patients. The receptionist only needs to see some of the information, Name the security measure that is provided by the system to serve the above purpose. (2 marks) Doctors should be allowed to read patients’ records, edit them, and delete, Nurses should be allowed to read and change but not delete and the receptionist should be allowed only to read the records. Which security measure is most suitable for this purpose’ (2 marks) [otal ~ 8 marks] What is the method used to prevent data from misuse when it is being transferred between computers via a network (especially via a public network such as the internet)? (2 marks) Explain the above answer briefly with a suitable diagram. (5 marks) 7 marks} [Total contd.....to page 4 Grade 8 Computing contd.....from page 3 (5) The following image shows an office building, Write a security measure that can be taken at each point. ZI ) Y]) yy iffy Mg [Total =2 * 4 = 8 marks} END Ref: CP

You might also like