20 questions
Chapter1-A person with an interest in an issue or someone who is affected by an issue.
Stakeholders
Equality of Access
Standards
Health
Chapter1-Involves a user proving their identity. โ Authenticity
TRUE
FALSE
Chapter1-When a user attempts to access an area of a system they are not permitted to be accessing. : Security
TRUE
FALSE
Chapter1-How data is communicated to other systems.
Networking
Security
Integrity
Processing
Chapter2-Storage unit: 1024 megabytes.
Yottabyte
KB
GB
PB
Chapter2- System of tags which contain data that can be read from a distance using radio waves.
Wireless Connection
Random Access Memory
Optical Mark Recognition
Optical Character Recognition
Radio Frequency Identification
Chapter2- Storage systems which are found inside the computer and are electronic. RAM and ROM are examples. : Primary storage
TRUE
FALSE
Chapter3- Software, whose source code is freely available and can be changed and distributed.
Copyright
Open source
User Interface
Cloud computing
Shareware
Chapter 3- Application software for creating written documents such as letters or essays.
multimedia software
web development software
word processing software
desktop publishing software
Chapter3- Application software for creating and editing presentations, animations, and video. โ spreadsheet software
TRUE
FALSE
Chapter4- Hardware or software that controls access to a network. โ firewall
TRUE
FALSE
Chapter4- Computer on a network that provides services or performs work for others.
client computer
Mainframe
Server
Cloud Computing
Chapter4- Unique address embedded in network connected devices.
MAC Asdress
IP Address
Binary Code
Hexadecimal Code
Serial Number
Chapter4- System that automatically assigns IP addresses to computers on a network.
Proxy Server
Dynamic Host Control Protocol
File Transfer Protocol
TCP /IP
Mac Filtering
Chapter4- Network in which all computers are equal and there are no centralised servers.
Peer to Peer
Thin Client
Server / Client
Personal Area Network
Hotspot
Chapter4-To transfer data from a client computer to a server โ download
TRUE
FLASE
Chapter5- Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.
cracking
pharming
smishing
hacking
checking
Chapter5- Result of encrypting plaintext. โ encryption key
TRUE
FALSE
Chapter5-vulnerability scanner โ Software to scan a system for potential security problems
TRUE
FLASE
Chapter5- Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.
symmetric key encryption
Secure Socket Layer
full disk encryption
asymmetric key encryption