
BTEC Comp 3 Revision Lesson
Presentation
•
Computers
•
9th Grade - University
•
Hard
Shahbaz Farooq
Used 14+ times
FREE Resource
38 Slides • 72 Questions
1
BTEC Comp 3 Revision Lesson
By Shahbaz Farooq
2
Warm up Questions
3
Multiple Choice
Blackspots are
hackers that intend to steal data
The name of a hacking group
A type of worm that corrupts data
Areas with no signal
4
Multiple Choice
City locations have faster internet than rural ones.
True
False
5
Multiple Choice
What is Scalability?
Being able to pay for more/less space as required
Running out of space on your cloud service
Hacking someone's cloud storage and deleting all of their files.
Being able to run software through the cloud
6
Multiple Choice
Which is not one of the methods which computers are able to connect to the internet
Ethernet cable
Wifi
Mobile signal
Cloud computing
7
Multiple Select
Which of these may affect a network's availability? (choose three)
Being in a rural locations
Being in a developing country
Having an expert user
Using too many applications
Mobile network coverage
8
Multiple Select
Which two of these are a type of Ad-hoc network?
Closed wired network
Open Wi-Fi
Closed Wi-Fi
Tethering or Personal Hotspots
9
Multiple Choice
What is an "ad hoc" network
Mobile 4G network
A temporary network which may be wireless
Rural area network
Public wifi
10
Multiple Select
What are two disadvantages of online software?
It can lose connection and work done may be lost
Difficult to share files
Everyone might have a different version of a file
Needs internet connection to work
11
Round 1
12
Multiple Choice
Why are access levels useful?
They give everyone access to all parts of the network
They give everyone 'download' access to the network
They control the level of access a user has to the network
They stop everyone in the organisation from accessing the system
13
Multiple Select
How do you make a login secure? (Choose all that apply)
A combination capital letter, number and symbols/special charatcters
Using a phrase like "iloveManU"
Enabling 2 factor authentication
using password as a password
14
Multiple Choice
15
16
17
Multiple Select
Identify the benefits of online facilities. (Choose all that apply)
Brings an organisation's products and services to a wider market
Hackers can intercept payment information.
Convenience for individuals who can shop 24/7 and access a wider range of products and services, which can mean competitive prices.
An online business does not require the same financial model as a high street business and can be easily set up.
18
Multiple Choice
What word describes the unfair treatment of individuals (or groups) based on factors such as race, age, gender or disability?
Discrimination
Accessibility
Copyright
Privilege
19
Multiple Choice
Which of the following can be punished with a fine or imprisonment?
Accepted standards
Legislation
Professional guidelines
20
Multiple Choice
The four principles of WCAG (Web content Accessibility Guidelines) say content should be Perceivable, Operable, Robust and one other. What was the other principle?
Copyright
Dispersed
Peripheral
Understandable
21
22
23
Multiple Select
Internal Threats to a company can be...
Employees visiting untrustworthy websites
Employees bringing in portable devices containing malware
Someone hacking a computer from across the internet
Someone flooding the company website with traffic and data to take it down
24
Multiple Select
What are 2 internal threats to a company?
Staff passing confidential information on
Users overriding security controls
Misuse of equipment
Getting hacked and viruses
25
Multiple Select
What does a ‘rogue employee’ mean?
Worker who may steal or damage data from within
Worker who does not follow the rules of their company
Worker who now works for another company
Someone who never worked for the company
26
Multiple Choice
Unsafe IT practice by an employee is an example of an internal security threat?
True
False
27
Multiple Choice
28
29
30
Multiple Choice
A Man in the Middle Attack is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
31
Multiple Choice
What does a DOS do?
Floods a server with requests causing it to go offline
Puts a virus file onto your computer
Gets users to share sensitive information through a false pretext.
It is action taken to fix something that has gone wrong.
32
Multiple Choice
What is phishing?
Is a type of malware disguised as legitimate programs.
Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines
A cyber attack that sends spam messages to try and trick people to reply with the desired information.
An attack on a remote computer by making it unable to respond to legitimate user requests.
33
Multiple Choice
What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
Rootkit
Ransomware
Botnet
Trojan
34
35
36
Round 2
What did you score for Round 1
Don't cheat
37
Multiple Select
Tick all of the following platforms which may be used to access cloud computing applications:
Desktop Computer
Notebook (Laptop)
Smartphone
Tablet Computer
38
Multiple Select
Which of the following methods can a smartphone typically used to connect to the internet?
WiFi
Ethernet
4G
3G
39
Multiple Choice
Having files copied to multiple devices using a cloud service is referred to as...
Back-up
Syncing
Copying
Duplication
40
Multiple Choice
Sometimes when using a cloud syncing service all files may not be copied to a smartphone, why is this?
Not enough storage space
Not enough memory
Screen size is too small
It's a portable device
41
42
43
Multiple Select
The benefits of having files synced by a cloud service are...
Files are only available on one device
Files are available across a wide range of devices
File changes are updated across devices
Files take up less space since they are on multiple devices
44
Multiple Choice
Using cloud technologies would be useful in an earthquake because
The servers are higher up with been in the cloud
The servers are in countries where earthquakes don't happen as often
The servers are physically located away from the organisation itself
The servers have great resilience and are very happy
45
Multiple Select
What are two advantages of cloud computing
Available 24/7
Automatic updates
Easy to access
Optional backups
46
47
48
Multiple Choice
Cloud Computing applications are typically accessed through...
Hardware on your computer.
A proxy server.
A web browser.
An offline application.
49
Multiple Select
The cost of a cloud providers service could be...
Expensive
Fixed
Variable
Inexpensive
50
Multiple Select
Downtime on a cloud service may be caused by?
Cyber attacks
System updates
Internet connectivity issues
Loss of WiFi connectivity
51
52
53
Multiple Select
Which of these are a type of Ad-hoc network? (click three)
Personal Area Network (PAN)
Open Wi-Fi
Closed Wi-Fi
Tethering or Personal Hotspots
Closed wired network
54
Multiple Choice
Accessibility is
is the unfair treatment of individuals (or groups) based on factors such as race, age, gender or disability
about how devices are designed for people with disabilities to use with ease.
a term used to describe how involved someone is in a task and how much attention they are paying to it
is about different ways to involve employees who have useful skills to contribute but who are not able to work in a traditional way.
55
Multiple Choice
Inclusivity is
is the unfair treatment of individuals (or groups) based on factors such as race, age, gender or disability
about how devices are designed for people with disabilities to use with ease.
a term used to describe how involved someone is in a task and how much attention they are paying to it
is about different ways to involve employees who have useful skills to contribute but who are not able to work in a traditional way.
56
Multiple Select
Which of the following are advantages of flexible working practices?
improved work life balance
decreased stress levels
can be expensive to implement
can provide support with family commitments
57
58
59
Round 3
60
Multiple Choice
Which poisonous metals can computers contain, which can cause an issue when they are thrown away?
Iron
Copper
Lead
Mercury
61
Multiple Choice
Which is cheaper to run?
A laptop
A desktop
62
Multiple Choice
It can be better for the environment to upgrade a PC rather than replace it.
True
False
63
64
65
Multiple Choice
Equal access is about making sure you get the internet speeds you pay for.
True
False
66
Multiple Choice
What is the term sometimes used to describe the unequal access between poorer countries/people and richer countries/people?
The Digital Divide
The Equality Act
Net Neutrality
IT Inequality
67
Multiple Select
What would be the impact on businesses of not having net neutrality?
Choose two options.
They may have to pay extra for fast internet speeds for employees to do their work.
They would have faster internet speeds at the same price they currently pay with net neutrality.
They may have to pay extra for fast internet speeds for customers visiting their website.
They may find their internet bill will become cheaper saving them money.
68
Multiple Select
Which of the following would be negative effects on a organisation if Net Neutrality were removed? (Choose all that apply)
Free speech through social networking could be blocked or filtered
Block illegal use of peer-to-peer (P2P) technologies which allow sharing of copyrighted material.
ISP's can charge content providers more for resource-hungry traffic such as gaming, video etc. allowing more investment in their networks.
Greater monitoring of users' online activities, sold to advertisers etc.
69
Multiple Choice
Net neutrality is seen to be beneficial to smaller businesses.
True
False
70
71
72
Multiple Select
What aspects of data handling are regulated in the Data Protection Act? (Choose all that apply)
Encrypting data
Capturing data
Processing Data
Storing and protecting data
73
Multiple Select
Identify the drawbacks of data protection. (Choose all that apply)
Those who break the laws can face a fine or imprisonment.
Data protection laws are difficult to enforce.
Individuals now have rights over the data that organisations store about them.
Conviction rates are low which indicates that organisations are breaking data protection laws without being prosecuted.
74
Multiple Choice
Which of the following statements was added to the storing and protecting data regulations in 2018?
Data must not be kept for longer than necessary
Organisations must take appropriate action to prevent unauthorised or unlawful processing of data.
All data being stored about an individual should be anonymous, unless knowing the identity of the data subject in necessary to make sense of the data.
Organisations must act to prevent accidental loss, destruction of or damage to data.
75
Multiple Choice
76
Multiple Choice
77
78
79
Multiple Select
Which of the following are benefits of using shared data?
Choose two options.
Always accurate and safe.
Is automatically protected by the data protection act.
Helps businesses to better target advertising.
Helps businesses make better decisions.
80
Multiple Choice
What legislation protects the use of personal data shared with businesses?
Data Protection Act (1998)
Data Protection Act (2018)
Computer Misuse Act (1990)
Computer Misuse Act (1998)
81
Multiple Select
Transactional data is data that is automatically generated when IT systems are used in a process.
True
False
82
Multiple Choice
What is a data subject?
It Is the trail you leave when you visit different sites on the internet. You can view your footprint by visiting the browser history section of your browser.
It is an individual whose personal data is being stored
It is the recognisable design, words or symbols that have been legally registered by a company or individual for a company, product or name.
It is a navigational system that uses data transmitted by satellites to calculate the location of the device.
83
Multiple Select
Why is transactional data useful for organisations. (Click all that apply)
Data moving from one system to another can lose integrity
Data generated by one part of the organisation can often be used by other parts of the organisation.
More information means better decisions
Using existing data reduces the costs of collecting new data
84
Multiple Select
What are the reasons that an organisation needs to be responsible about the use of data? (Click on all that apply)
Ethical reasons - just because data is available does not mean you should use it.
Privacy - there is a duty of confidentiality in the UK
Cost - data can be valuable
Legal reasons as they could face prosecution
85
86
87
Multiple Choice
What does this symbol represent?
Input
Output
Process
Decision
88
Multiple Choice
What does this symbol represent?
Input
Input / Output
Process
Output
89
Multiple Choice
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
90
Multiple Choice
What does this symbol represent?
Input
Output
Process
Decision
91
Multiple Choice
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
92
Multiple Choice
What does this symbol represent?
Process
Data Store
External Entity
Data Flow
93
Multiple Choice
What is a Data Flow Diagram (DFD)?
A DFD is a graphical representation of how data flows through a business information system
A DFD is a flow chart that represent how data flows in a system
A DFD is is a way to structure an organization using different levels of authority and a vertical link, or chain of command, between superior and subordinate levels of the organization
A DFD is a chart showing how data is handled
A DFD is a graphical representation of how data flows through a business information system
94
Multiple Choice
What does the following describe?
A person, object or company. For example, shop assistant, customer, credit card processor
Entity
Process
Data store
Data flow
95
Final Round
96
97
98
Multiple Choice
Which type of policy might contain the following:
Staff cannot use the computers for personal shopping
Internet usage
Software
Personal Devices
Backup
99
Multiple Choice
Which type of policy might contain the following:
Must be approved via the IT support team before being installed
Internet usage
Software
Personal Devices
Backup
100
Multiple Choice
Which type of policy might contain the following:
Must use 6 characters, including at least 1 number
Internet usage
Passwords
Personal Devices
Backup
101
Multiple Select
Which of these are types of disaster which should be included in a disaster recovery policy?
(SELECT MORE THAN ONE ANSWER)
Cyber Attack
Coffee Spill
Fire
Data Loss
102
Multiple Choice
What is the FIRST step in response to an attack?
RESPOND
MANAGE
ANALYSE
INVESTIGATE
ANALYSE
103
Multiple Choice
Which of these is the THIRD step in the event of an attack
RESPOND
INVESTIGATE
RECOVER
ANALYSE
MANAGE
104
Multiple Choice
Which of these is the FIFTH step in the event of an attack
RESPOND
INVESTIGATE
RECOVER
ANALYSE
MANAGE
105
106
107
108
109
110
BTEC Comp 3 Revision Lesson
By Shahbaz Farooq
Show answer
Auto Play
Slide 1 / 110
SLIDE
Similar Resources on Wayground
102 questions
History of Vietnam War Review
Presentation
•
9th - 12th Grade
104 questions
A+ Chapter 2 Module A
Presentation
•
7th - 12th Grade
101 questions
english 9
Presentation
•
9th - 12th Grade
100 questions
Unit 4: Evolution & Natural Selection
Presentation
•
9th - 12th Grade
108 questions
Wildlife and Exotic Radiology
Presentation
•
KG - University
106 questions
Blood Type Mystery
Presentation
•
9th - 12th Grade
106 questions
KEBEKERJAAN
Presentation
•
9th - 12th Grade
101 questions
INDEPENDENCIA DE CHILE
Presentation
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
7 questions
Warm Up 04.01.2026
Quiz
•
9th Grade
50 questions
STAAR English 2 Review
Quiz
•
10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Figurative Language Review
Quiz
•
10th Grade
20 questions
Linear Functions Review
Quiz
•
9th Grade
30 questions
English 1 STAAR Review
Quiz
•
9th Grade
10 questions
Pythagorean Theorem and its Converse
Quiz
•
7th - 9th Grade
14 questions
Ecological Succession: Primary and Secondary
Quiz
•
9th Grade