AS CS Unit 05 & 06

AS CS Unit 05 & 06

Assessment

Passage

Created by

Haotian Wu

Computers

1st - 5th Grade

2 plays

Hard

25 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 3 pts

State one difference and one similarity between pharming and phishing

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 3 pts

Describe how a firewall protects the data on the computer.

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 3 pts

Describe the difference between the security and privacy of data.

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 3 pts

Identify one other software-based measure that could be used to restrict the access to the data on the computers. ( expect username & password )

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 3 pts

Give two similarities and one difference between spyware and a virus.

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 3 pts

Describe how data validation and data verification help protect the integrity of data.

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 3 pts

Describe how data verification help protect the integrity of data.

Evaluate responses using AI:

OFF

8.

OPEN ENDED QUESTION

3 mins • 3 pts

A checksum can be used to detect errors during data transmission.

Describe how a checksum is used.

Evaluate responses using AI:

OFF

9.

OPEN ENDED QUESTION

3 mins • 3 pts

Describe how a parity block check can identify a bit that has been corrupted during

transmission.

Evaluate responses using AI:

OFF

10.

OPEN ENDED QUESTION

3 mins • 3 pts

Each of the following algorithms performs data validation.

State the type of validation check that each of the algorithms performs.

Evaluate responses using AI:

OFF

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?