Search Header Logo
Safe and Responsible Use of ICT

Safe and Responsible Use of ICT

Assessment

Presentation

Computers

10th - 12th Grade

Practice Problem

Hard

Created by

Lee Chong

Used 2+ times

FREE Resource

2 Slides • 17 Questions

1

Safe and Responsible Use of ICT

By Coleman Chong

2

In this chapter, you need to understand and memorise the following

4) 5 types of software licences ​

​5) 2 types of copyright infringement

6) Social, ​economic and ethical use of ICT in communication, education, healthcare, transportation, finance, entertainment

1) 4 causes of data losses and theirs prevention

2) Definition of all computer threats and their prevention

3) ​Two ways to prevent unauthorised access and their definition

3

Multiple Select

Which of the following are the causes of data losses?

1

human error

2

power failure

3

hardware failure

4

malicious software

4

Multiple Choice

Which of the following are the cause of data loss due to human error ?

1

Device damages due to wear and tear.

2

Device damages during usage

3

Data is deleted on purpose.

4

Multiple user edit the document at the same time

5

Multiple Choice

Which is the method to prevent data loss due to power outage?

1

Install USB

2

Install UPS

3

Install additional generator

4

Save multiple copies of files.

6

Multiple Select

Which of the following are the measures to prevent malicious software?

1

Install anti-virus software

2

Install firewall

3

Make regular backup of the files

4

Avoid opening attachment from unknown sources

7

Multiple Select

Which of the following is true about Trojan?

1

It is a piece of software that can hide from anti-virus detection

2

It will replicate itself

3

It deletes data from your computer

4

It allows unauthorised access to your computer

8

Open Ended

Give a definition about virus.

9

Multiple Choice

Explain what is spyware.

1

It is a small file that will be downloaded in your computer when you visit some website.

2

It monitors your acitviity by recording your key pressed.

3

It does not have malicious intent

4

It deletes your files

10

Draw

Is Mr Chong handsome?

11

Multiple Choice

Explain what is hacking

1

It is an act to record personal information of the user

2

Hacking is very hard to detect

3

Hacking is to install spyware on your computer

4

It is an act which users gain unauthorised access to your computer

12

Multiple Choice

Explain the term cookies.

1

It is a small file stored in your computer and it is hamful

2

It is a small file stored in your computer which enable to website to remember the details

3

It is a small file monitoring your key pressed

4

It is a small file stored your usernae and password

13

Open Ended

Describe the difference between pharming and phishing.

14

Multiple Select

Which of the following are the correct way to implement authentication

1

Use of strong password

2

Use of firewall

3

Use of VPN

4

Use of two-factor authentication

15

Multiple Select

Which of the following are the correct ways to implement proper authorisation?

1

Install anti-virus software

2

Install firewall

3

Use proper file permission

4

Install two-factor authentication

16

Multiple Select

Which of the following are the use of firewall?

1

Filter internet content to delete suspicious attachment

2

Authenticate user and allows them to access only certain files

3

Control the websites that user can access to

4

Block suspicious internet traffic

17

Draw

Give 5 types of licences.

18

Multiple Select

Which of the following is true about software with public domain licence?

1

Its licence is either not applicable or has expired

2

You can modify its code or interface

3

Its licence is only for limited use

4

It is illegal to use it for your own work

19

Multiple Choice

I modify a software and customise for my own use. I also seek permission or acknowledge the creator of the software. What kind of licence allow me to do so?

1

Shareware

2

freeware

3

commercial software

4

creative common licence

Safe and Responsible Use of ICT

By Coleman Chong

Show answer

Auto Play

Slide 1 / 19

SLIDE