IT9626 unit 3 & 5 Test

IT9626 unit 3 & 5 Test

12th Grade

8 Qs

quiz-placeholder

Similar activities

Communication Skills In the Beauty Industry

Communication Skills In the Beauty Industry

10th - 12th Grade

11 Qs

Motion Information and Media Quiz

Motion Information and Media Quiz

12th Grade

10 Qs

ONLINE SYSTEMS, FUNCTIONS AND PLATFORMS

ONLINE SYSTEMS, FUNCTIONS AND PLATFORMS

11th - 12th Grade

10 Qs

EXERCISE  WEEK 2 MIL

EXERCISE WEEK 2 MIL

12th Grade

10 Qs

CCNA

CCNA

12th Grade

12 Qs

ICT Matters

ICT Matters

4th Grade - Professional Development

10 Qs

Segurança

Segurança

9th - 12th Grade

12 Qs

IT9626 unit 3 & 5 Test

IT9626 unit 3 & 5 Test

Assessment

Quiz

Instructional Technology

12th Grade

Practice Problem

Easy

Created by

Ehtesham Malik

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

OPEN ENDED QUESTION

5 mins • 7 pts

In a recent BBC news bulletin it was said: ‘It takes 82 seconds for cyber-thieves to ensnare the first victim of a phishing campaign, a report suggests.’ ‘Hackers exploit router flaws in unusual pharming attack.’ Describe what is meant by:

(a) phishing 4 marks

(b) pharming 3 marks

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

5 mins • 6 pts

Personal data and other sensitive types of data often need to be kept confidential or restricted to authorised staff. Explain why personal data should be kept confidential (6 marks)

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

10 mins • 8 pts

Phishing is an attempt by fraudsters to gather personal information using email. Receivers of emails should use several different methods to prevent phishing attacks. Evaluate the different methods which can be used to prevent phishing (8 marks)

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 7 pts

Hackers sometimes commit fraud after causing spyware to be installed on other users’ computers.

(a) Describe what is meant by the term ‘spyware’ ( 3 marks)

(b)(b) Explain how a hacker uses the information gained from spyware to commit fraud.( 4 marks)

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

5 mins • 6 pts

Sensors are used in monitoring systems to measure physical variables. It is important that sensors are calibrated before use. (a) Describe, in detail, these sensors and give an appropriate use for each. Each use must be different.

a) Humidity (marks 2)

b)Sound (marks 2)

c) Explain the importance of calibration (marks 2)

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 4 pts

Sensors are used in monitoring and control to measure physical variables. (a) Describe these sensors. For each sensor, explain how it could be used in a control system. Each system must be different.

a)Infrared ( marks 2)

b)Ultrasonic (marks 2)

Evaluate responses using AI:

OFF

7.

CLASSIFICATION QUESTION

5 mins • 4 pts

Organize these options into the right categories

Groups:

(a) trojan

,

(b) rootkit

,

(c) spyware

,

(d) virus

it looks harmless

it distinguish itself as a legitimate software

it is designed to spread much like human virus

it infects new files

keylogger

enables to gain adminsitrative access

in this method peron drops usb so other can take it with curiosity and get victim

designed to gather information about your interactions with your computer

8.

OPEN ENDED QUESTION

10 mins • 8 pts

Exaplin a real world example of control system against intruders? also make a flowchart to demonstrate how this broken glass detection control will operate?

Evaluate responses using AI:

OFF