Search Header Logo
BTEC Comp 3 Revision Lesson

BTEC Comp 3 Revision Lesson

Assessment

Presentation

•

Computers

•

9th Grade - University

•

Hard

Created by

Shahbaz Farooq

Used 14+ times

FREE Resource

38 Slides • 72 Questions

1

BTEC Comp 3 Revision Lesson

By Shahbaz Farooq

2

​Warm up Questions

3

Multiple Choice

Blackspots are

1

hackers that intend to steal data

2

The name of a hacking group

3

A type of worm that corrupts data

4

Areas with no signal

4

Multiple Choice

City locations have faster internet than rural ones.

1

True

2

False

5

Multiple Choice

What is Scalability?

1

Being able to pay for more/less space as required

2

Running out of space on your cloud service

3

Hacking someone's cloud storage and deleting all of their files.

4

Being able to run software through the cloud

6

Multiple Choice

Which is not one of the methods which computers are able to connect to the internet

1

Ethernet cable

2

Wifi

3

Mobile signal

4

Cloud computing

7

Multiple Select

Which of these may affect a network's availability? (choose three)

1

Being in a rural locations

2

Being in a developing country

3

Having an expert user

4

Using too many applications

5

Mobile network coverage

8

Multiple Select

Which two of these are a type of Ad-hoc network?

1

Closed wired network

2

Open Wi-Fi

3

Closed Wi-Fi

4

Tethering or Personal Hotspots

9

Multiple Choice

What is an "ad hoc" network

1

Mobile 4G network

2

A temporary network which may be wireless

3

Rural area network

4

Public wifi

10

Multiple Select

What are two disadvantages of online software?

1

It can lose connection and work done may be lost

2

Difficult to share files

3

Everyone might have a different version of a file

4

Needs internet connection to work

11

Round 1

12

Multiple Choice

Why are access levels useful?

1

They give everyone access to all parts of the network

2

They give everyone 'download' access to the network

3

They control the level of access a user has to the network

4

They stop everyone in the organisation from accessing the system

13

Multiple Select

How do you make a login secure? (Choose all that apply)

1

A combination capital letter, number and symbols/special charatcters

2

Using a phrase like "iloveManU"

3

Enabling 2 factor authentication

4

using password as a password

14

Multiple Choice

What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?
1
digital certificates
2
WEP
3
biometrics
4
RADIUS

15

media

16

media

17

Multiple Select

Identify the benefits of online facilities. (Choose all that apply)

1

Brings an organisation's products and services to a wider market

2

Hackers can intercept payment information.

3

Convenience for individuals who can shop 24/7 and access a wider range of products and services, which can mean competitive prices.

4

An online business does not require the same financial model as a high street business and can be easily set up.

18

Multiple Choice

What word describes the unfair treatment of individuals (or groups) based on factors such as race, age, gender or disability?

1

Discrimination

2

Accessibility

3

Copyright

4

Privilege

19

Multiple Choice

Which of the following can be punished with a fine or imprisonment?

1

Accepted standards

2

Legislation

3

Professional guidelines

20

Multiple Choice

The four principles of WCAG (Web content Accessibility Guidelines) say content should be Perceivable, Operable, Robust and one other. What was the other principle?

1

Copyright

2

Dispersed

3

Peripheral

4

Understandable

21

media

22

media

23

Multiple Select

Internal Threats to a company can be...

1

Employees visiting untrustworthy websites

2

Employees bringing in portable devices containing malware

3

Someone hacking a computer from across the internet

4

Someone flooding the company website with traffic and data to take it down

24

Multiple Select

What are 2 internal threats to a company?

1

Staff passing confidential information on

2

Users overriding security controls

3

Misuse of equipment

4

Getting hacked and viruses

25

Multiple Select

What does a ‘rogue employee’ mean?

1

Worker who may steal or damage data from within

2

Worker who does not follow the rules of their company

3

Worker who now works for another company

4

Someone who never worked for the company

26

Multiple Choice

Unsafe IT practice by an employee is an example of an internal security threat?

1

True

2

False

27

Multiple Choice

If an employee accidentally deletes data it is an example of what type of security threat?
1
Internal
2
External
3
Physical

28

media

29

media

30

Multiple Choice

A Man in the Middle Attack is...

1

Malicious Software (Viruses, Trojans, Spyware)

2

Intercepting data when it is been sent

3

Taking down a website by flooding it with data and traffic

4

Gaining unauthorised access to a computer

31

Multiple Choice

What does a DOS do?

1

Floods a server with requests causing it to go offline

2

Puts a virus file onto your computer

3

Gets users to share sensitive information through a false pretext.

4

It is action taken to fix something that has gone wrong.

32

Multiple Choice

What is phishing?

1

Is a type of malware disguised as legitimate programs.

2

Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines

3

A cyber attack that sends spam messages to try and trick people to reply with the desired information.

4

An attack on a remote computer by making it unable to respond to legitimate user requests.

33

Multiple Choice

What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

1

Rootkit

2

Ransomware

3

Botnet

4

Trojan

34

media

35

media

36

​Round 2

​What did you score for Round 1

Don't cheat​

37

Multiple Select

Tick all of the following platforms which may be used to access cloud computing applications:

1

Desktop Computer

2

Notebook (Laptop)

3

Smartphone

4

Tablet Computer

38

Multiple Select

Which of the following methods can a smartphone typically used to connect to the internet?

1

WiFi

2

Ethernet

3

4G

4

3G

39

Multiple Choice

Having files copied to multiple devices using a cloud service is referred to as...

1

Back-up

2

Syncing

3

Copying

4

Duplication

40

Multiple Choice

Sometimes when using a cloud syncing service all files may not be copied to a smartphone, why is this?

1

Not enough storage space

2

Not enough memory

3

Screen size is too small

4

It's a portable device

41

media

42

media

43

Multiple Select

The benefits of having files synced by a cloud service are...

1

Files are only available on one device

2

Files are available across a wide range of devices

3

File changes are updated across devices

4

Files take up less space since they are on multiple devices

44

Multiple Choice

Using cloud technologies would be useful in an earthquake because

1

The servers are higher up with been in the cloud

2

The servers are in countries where earthquakes don't happen as often

3

The servers are physically located away from the organisation itself

4

The servers have great resilience and are very happy

45

Multiple Select

What are two advantages of cloud computing

1

Available 24/7

2

Automatic updates

3

Easy to access

4

Optional backups

46

media

47

media

48

Multiple Choice

Cloud Computing applications are typically accessed through...

1

Hardware on your computer.

2

A proxy server.

3

A web browser.

4

An offline application.

49

Multiple Select

The cost of a cloud providers service could be...

1

Expensive

2

Fixed

3

Variable

4

Inexpensive

50

Multiple Select

Downtime on a cloud service may be caused by?

1

Cyber attacks

2

System updates

3

Internet connectivity issues

4

Loss of WiFi connectivity

51

media

52

media

53

Multiple Select

Which of these are a type of Ad-hoc network? (click three)

1

Personal Area Network (PAN)

2

Open Wi-Fi

3

Closed Wi-Fi

4

Tethering or Personal Hotspots

5

Closed wired network

54

Multiple Choice

Accessibility is

1

is the unfair treatment of individuals (or groups) based on factors such as race, age, gender or disability

2

about how devices are designed for people with disabilities to use with ease.

3

a term used to describe how involved someone is in a task and how much attention they are paying to it

4

is about different ways to involve employees who have useful skills to contribute but who are not able to work in a traditional way.

55

Multiple Choice

Inclusivity is

1

is the unfair treatment of individuals (or groups) based on factors such as race, age, gender or disability

2

about how devices are designed for people with disabilities to use with ease.

3

a term used to describe how involved someone is in a task and how much attention they are paying to it

4

is about different ways to involve employees who have useful skills to contribute but who are not able to work in a traditional way.

56

Multiple Select

Which of the following are advantages of flexible working practices?

1

improved work life balance

2

decreased stress levels

3

can be expensive to implement

4

can provide support with family commitments

57

media

58

media

59

​Round 3

60

Multiple Choice

Which poisonous metals can computers contain, which can cause an issue when they are thrown away?

1

Iron

2

Copper

3

Lead

4

Mercury

61

Multiple Choice

Which is cheaper to run?

1

A laptop

2

A desktop

62

Multiple Choice

It can be better for the environment to upgrade a PC rather than replace it.

1

True

2

False

63

media

64

media

65

Multiple Choice

Equal access is about making sure you get the internet speeds you pay for.

1

True

2

False

66

Multiple Choice

What is the term sometimes used to describe the unequal access between poorer countries/people and richer countries/people?

1

The Digital Divide

2

The Equality Act

3

Net Neutrality

4

IT Inequality

67

Multiple Select

What would be the impact on businesses of not having net neutrality?


Choose two options.

1

They may have to pay extra for fast internet speeds for employees to do their work.

2

They would have faster internet speeds at the same price they currently pay with net neutrality.

3

They may have to pay extra for fast internet speeds for customers visiting their website.

4

They may find their internet bill will become cheaper saving them money.

68

Multiple Select

Which of the following would be negative effects on a organisation if Net Neutrality were removed? (Choose all that apply)

1

Free speech through social networking could be blocked or filtered

2

Block illegal use of peer-to-peer (P2P) technologies which allow sharing of copyrighted material.

3

ISP's can charge content providers more for resource-hungry traffic such as gaming, video etc. allowing more investment in their networks.

4

Greater monitoring of users' online activities, sold to advertisers etc.

69

Multiple Choice

Net neutrality is seen to be beneficial to smaller businesses.

1

True

2

False

70

media

71

media

72

Multiple Select

What aspects of data handling are regulated in the Data Protection Act? (Choose all that apply)

1

Encrypting data

2

Capturing data

3

Processing Data

4

Storing and protecting data

73

Multiple Select

Identify the drawbacks of data protection. (Choose all that apply)

1

Those who break the laws can face a fine or imprisonment.

2

Data protection laws are difficult to enforce.

3

Individuals now have rights over the data that organisations store about them.

4

Conviction rates are low which indicates that organisations are breaking data protection laws without being prosecuted.

74

Multiple Choice

Which of the following statements was added to the storing and protecting data regulations in 2018?

1

Data must not be kept for longer than necessary

2

Organisations must take appropriate action to prevent unauthorised or unlawful processing of data.

3

All data being stored about an individual should be anonymous, unless knowing the identity of the data subject in necessary to make sense of the data.

4

Organisations must act to prevent accidental loss, destruction of or damage to data.

75

Multiple Choice

What does the term Data Subject mean?
1
The person who stored the data
2
The person who decides how the data will be used
3
The person who controls the data
4
The person who's data it is

76

Multiple Choice

Information which is regarded as _________ is subject to stricter rules
1
sensitive
2
important
3
additional
4
dangerous

77

media

78

media

79

Multiple Select

Which of the following are benefits of using shared data?


Choose two options.

1

Always accurate and safe.

2

Is automatically protected by the data protection act.

3

Helps businesses to better target advertising.

4

Helps businesses make better decisions.

80

Multiple Choice

What legislation protects the use of personal data shared with businesses?

1

Data Protection Act (1998)

2

Data Protection Act (2018)

3

Computer Misuse Act (1990)

4

Computer Misuse Act (1998)

81

Multiple Select

Transactional data is data that is automatically generated when IT systems are used in a process.

1

True

2

False

82

Multiple Choice

What is a data subject?

1

It Is the trail you leave when you visit different sites on the internet. You can view your footprint by visiting the browser history section of your browser.

2

It is an individual whose personal data is being stored

3

It is the recognisable design, words or symbols that have been legally registered by a company or individual for a company, product or name.

4

It is a navigational system that uses data transmitted by satellites to calculate the location of the device.

83

Multiple Select

Why is transactional data useful for organisations. (Click all that apply)

1

Data moving from one system to another can lose integrity

2

Data generated by one part of the organisation can often be used by other parts of the organisation.

3

More information means better decisions

4

Using existing data reduces the costs of collecting new data

84

Multiple Select

What are the reasons that an organisation needs to be responsible about the use of data? (Click on all that apply)

1

Ethical reasons - just because data is available does not mean you should use it.

2

Privacy - there is a duty of confidentiality in the UK

3

Cost - data can be valuable

4

Legal reasons as they could face prosecution

85

media

86

media

87

Multiple Choice

Question image

What does this symbol represent?

1

Input

2

Output

3

Process

4

Decision

88

Multiple Choice

Question image

What does this symbol represent?

1

Input

2

Input / Output

3

Process

4

Output

89

Multiple Choice

Question image

What does this symbol represent?

1

Process

2

Data Store

3

External Entity

4

Data Flow

90

Multiple Choice

Question image

What does this symbol represent?

1

Input

2

Output

3

Process

4

Decision

91

Multiple Choice

Question image

What does this symbol represent?

1

Process

2

Data Store

3

External Entity

4

Data Flow

92

Multiple Choice

Question image

What does this symbol represent?

1

Process

2

Data Store

3

External Entity

4

Data Flow

93

Multiple Choice

What is a Data Flow Diagram (DFD)?

1

A DFD is a graphical representation of how data flows through a business information system

2

A DFD is a flow chart that represent how data flows in a system

3

A DFD is is a way to structure an organization using different levels of authority and a vertical link, or chain of command, between superior and subordinate levels of the organization

4

A DFD is a chart showing how data is handled

5

A DFD is a graphical representation of how data flows through a business information system

94

Multiple Choice

What does the following describe?

A person, object or company. For example, shop assistant, customer, credit card processor

1

Entity

2

Process

3

Data store

4

Data flow

95

​Final Round

96

media

97

media

98

Multiple Choice

Which type of policy might contain the following:

Staff cannot use the computers for personal shopping

1

Email

2

Internet usage

3

Software

4

Personal Devices

5

Backup

99

Multiple Choice

Which type of policy might contain the following:

Must be approved via the IT support team before being installed

1

Email

2

Internet usage

3

Software

4

Personal Devices

5

Backup

100

Multiple Choice

Which type of policy might contain the following:

Must use 6 characters, including at least 1 number

1

Email

2

Internet usage

3

Passwords

4

Personal Devices

5

Backup

101

Multiple Select

Which of these are types of disaster which should be included in a disaster recovery policy?

(SELECT MORE THAN ONE ANSWER)

1

Cyber Attack

2

Coffee Spill

3

Fire

4

Data Loss

102

Multiple Choice

What is the FIRST step in response to an attack?

1

RESPOND

2

MANAGE

3

ANALYSE

4

INVESTIGATE

5

ANALYSE

103

Multiple Choice

Which of these is the THIRD step in the event of an attack

1

RESPOND

2

INVESTIGATE

3

RECOVER

4

ANALYSE

5

MANAGE

104

Multiple Choice

Which of these is the FIFTH step in the event of an attack

1

RESPOND

2

INVESTIGATE

3

RECOVER

4

ANALYSE

5

MANAGE

105

media

106

media

107

media

108

media

109

media

110

media

BTEC Comp 3 Revision Lesson

By Shahbaz Farooq

Show answer

Auto Play

Slide 1 / 110

SLIDE