Chapter 5: eSecurity
Q1: What is eSecurity and why is it important?
A:
eSecurity refers to measures taken to protect digital systems, networks, and data from unauthorized access, cyber threats, and data breaches. It is important because it:
- Prevents data loss and theft
- Protects personal and financial information
- Maintains system integrity and confidentiality
- Ensures business continuity
Q2: What are the three key principles of information security?
A:
The three key principles are CIA (Confidentiality, Integrity, Availability):
- Confidentiality – Ensures that only authorized users can access sensitive data.
- Integrity – Ensures that data is accurate and has not been altered.
- Availability – Ensures that authorized users can access data when needed.
Q3: What are some common cyber threats and how can they be prevented?
A:
Cyber Threat | Description | Prevention |
---|---|---|
Phishing | Fraudulent emails tricking users into revealing information | Do not click unknown links, verify sender |
Malware | Malicious software that damages systems | Use antivirus, update software regularly |
Denial of Service (DoS) | Overloading a system to make it unavailable | Use firewalls and traffic monitoring |
SQL Injection | Inserting malicious SQL commands to access databases | Use parameterized queries, input validation |
Q4: What are the differences between symmetric and asymmetric encryption?
A:
Feature Symmetric Encryption Asymmetric Encryption Keys Used Same key for encryption & decryption Public key for encryption, private key for decryption Speed Faster Slower Security Less secure if the key is exposed More secure Example AES, DES RSA, ECC
Q5: What is a firewall, and how does it improve security?
A:
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- It blocks unauthorized access.
- It prevents malware from entering a network.
- It filters harmful or unwanted traffic.
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Q6: What is two-factor authentication (2FA) and why is it important?
A:
Two-factor authentication (2FA) is a security process requiring two different forms of verification (e.g., password + OTP). It enhances security by:
- Reducing unauthorized access
- Adding an extra security layer even if the password is stolen
Two-factor authentication (2FA) is a security process requiring two different forms of verification (e.g., password + OTP). It enhances security by:
Q7: What are biometric security measures? Provide examples.
A:
Biometric security measures use unique physical or behavioral characteristics for authentication. Examples:
- Fingerprint scanning – Used in smartphones and access control
- Facial recognition – Used in airports and secure devices
- Iris scanning – Used in high-security environments
Exam-style questions
1 Identify three guidelines that can help keep personal data safe.
[3]
Answer 1: Any three from the following [3]: • Set strong passwords. • Encrypt personal
data. • Use a firewall to monitor traffic. • Regularly scan computer with
detection and prevention software. • Only visit and use trusted sources. • Do
not open any email attachments from unknown and untrusted sources. • Check the
URL of any link. Be cautious about any personal data shared. • Set all privacy
settings to the most secure setting. • Report and block suspicious activity.
2 Explain one difference between phishing and pharming. [1]
Answer 2: Phishing involves clicking a link in an email that takes a user to the fake
website, whereas pharming downloads malicious code onto a user’s computer that
redirects them to the fake website [1].
3 Explain two similarities between phishing and pharming. [2]
Answer 3
All of the following [2]: • They can both involve a user receiving a fake
email. • They are both designed to collect a user’s personal data.
4 Identify four different types of malware. [4]
Answer 4
Any four of the following [4]: • virus • trojan • worm • spyware • adware •
rootkit • malicious bots • ransomware.
5 Describe how a firewall can be used to help prevent a virus
infecting a computer system. [5]
Answer 5
All of the following [5]: • Firewall monitors incoming and outgoing traffic
from a computer system. • User can set rules and criteria for the data, which
could include detecting known viruses. • User can close certain ports on
firewall that are often used by hackers to infiltrate a firewall. • Firewall
compares traffic to rules and criteria set. • Firewall can decline traffic if
it does not meet the rules and criteria set.
6 Describe how spyware can be used to obtain a user’s password for
an online account. [5]
Answer 6
Any five of the following [5]: • A user could click a link / open an attachment
/ download software that could trigger the download of spyware onto the user
computer. • The spyware could be software, such as a key logger. • The spyware
will record all the keypresses the user makes. • The recorded keypresses are
sent to a third party. • The third party analyses the data looking for patters
and trends. If a patter is identified, this could be data that is used as a
password.
7 Rootkits can be used to allow an authorised person to hide illegal
files on a user’s computer. a State what is meant by a rootkit. [1] b Explain
how the risk of rootkits can be minimised. [2] c Identify two other malicious
ways that rootkits can be used. [2] [Total 5]
Answer 7
a A rootkit is a computer program that enables a person to gain administrator
access to a victim’s computer [1]. b Any one of the following (2 marks per
bullet) [2]: • Set a strong password for the computer. • Only download data
from trusted sources. • Don’t insert a USB that you find into your computer. c
All of the following [2]: • Steal a user’s personal data. • Use the user’s
computer as part of a larger cyber security attack.
8 Ransomware can be used to prevent a user gaining access to their
data. a State how ransomware prevents the user gaining access to their data.
[1] b Explain two measures that can be taken to minimise the risk of
ransomware. [2]
Answer 8 a It
encrypts the data [2]. b Any two from the following [2]: • Store data in the
cloud. • Keep an up-to-date backup of data, away from the computer system. •
Only open and use software from trusted sources
Biometric security measures use unique physical or behavioral characteristics for authentication. Examples:
Exam-style questions
1 Identify three guidelines that can help keep personal data safe.
[3]
Answer 1: Any three from the following [3]: • Set strong passwords. • Encrypt personal data. • Use a firewall to monitor traffic. • Regularly scan computer with detection and prevention software. • Only visit and use trusted sources. • Do not open any email attachments from unknown and untrusted sources. • Check the URL of any link. Be cautious about any personal data shared. • Set all privacy settings to the most secure setting. • Report and block suspicious activity.
2 Explain one difference between phishing and pharming. [1]
Answer 2: Phishing involves clicking a link in an email that takes a user to the fake website, whereas pharming downloads malicious code onto a user’s computer that redirects them to the fake website [1].
3 Explain two similarities between phishing and pharming. [2]
Answer 3 All of the following [2]: • They can both involve a user receiving a fake email. • They are both designed to collect a user’s personal data.
4 Identify four different types of malware. [4]
Answer 4 Any four of the following [4]: • virus • trojan • worm • spyware • adware • rootkit • malicious bots • ransomware.
5 Describe how a firewall can be used to help prevent a virus
infecting a computer system. [5]
Answer 5 All of the following [5]: • Firewall monitors incoming and outgoing traffic from a computer system. • User can set rules and criteria for the data, which could include detecting known viruses. • User can close certain ports on firewall that are often used by hackers to infiltrate a firewall. • Firewall compares traffic to rules and criteria set. • Firewall can decline traffic if it does not meet the rules and criteria set.
6 Describe how spyware can be used to obtain a user’s password for
an online account. [5]
Answer 6 Any five of the following [5]: • A user could click a link / open an attachment / download software that could trigger the download of spyware onto the user computer. • The spyware could be software, such as a key logger. • The spyware will record all the keypresses the user makes. • The recorded keypresses are sent to a third party. • The third party analyses the data looking for patters and trends. If a patter is identified, this could be data that is used as a password.
7 Rootkits can be used to allow an authorised person to hide illegal
files on a user’s computer. a State what is meant by a rootkit. [1] b Explain
how the risk of rootkits can be minimised. [2] c Identify two other malicious
ways that rootkits can be used. [2] [Total 5]
Answer 7 a A rootkit is a computer program that enables a person to gain administrator access to a victim’s computer [1]. b Any one of the following (2 marks per bullet) [2]: • Set a strong password for the computer. • Only download data from trusted sources. • Don’t insert a USB that you find into your computer. c All of the following [2]: • Steal a user’s personal data. • Use the user’s computer as part of a larger cyber security attack.
8 Ransomware can be used to prevent a user gaining access to their
data. a State how ransomware prevents the user gaining access to their data.
[1] b Explain two measures that can be taken to minimise the risk of
ransomware. [2]
Answer 8 a It encrypts the data [2]. b Any two from the following [2]: • Store data in the cloud. • Keep an up-to-date backup of data, away from the computer system. • Only open and use software from trusted sources
Chapter 6: The Digital Divide
Q1: What is the digital divide and what are its causes?
A:
The digital divide is the gap between individuals, communities, or countries in accessing and using digital technologies.
Causes include:
- Economic factors – Some people cannot afford devices or internet access.
- Geographical location – Rural areas may lack broadband infrastructure.
- Education & Skills – Lack of digital literacy limits technology use.
- Government Policies – Poor investment in IT infrastructure widens the gap.
Q2: How can the digital divide be reduced?
A:
- Government investment in internet infrastructure
- Providing affordable devices and internet services
- Offering digital literacy programs in schools and workplaces
- Encouraging public-private partnerships for technology access
Q3: How does the digital divide impact education?
A:
- Students without internet access struggle with online learning.
- Lack of digital devices reduces engagement and learning opportunities.
- Limits access to educational resources like e-books and research papers.
Q4: What is the role of governments in bridging the digital divide?
A:
Governments can:
- Invest in IT infrastructure (broadband expansion).
- Offer subsidies for devices and internet access.
- Introduce digital literacy programs in schools and communities.
- Encourage public-private partnerships to promote technology access.
Governments can:
Q5: Explain the term ‘technology leapfrogging’ in relation to the digital divide.
A:
Technology leapfrogging refers to skipping older technologies and directly adopting newer innovations. Example:
- Developing countries adopting mobile banking instead of traditional banking.
- Using solar-powered internet instead of building expensive infrastructure.
Exam-style questions
1 Define the term ‘digital divide’. [1]
Answer1
The term refers to the technology divide between countries, demographic groups
and economic areas [1].
2 Identify two aspects that can create a
digital divide. [2]
Answer 2
Any two from the following [2]: • people living in cities vs people living in
rural areas. • people educated in using technology vs people uneducated in
using technology. • older people vs younger people. • areas that are more
industrially developed vs areas that are less industrially developed. •
different socio-economic groups.
3 Explain the impact of the digital divide on
a person’s geographical location. [4]
Answer 3
All of the following [4]: • The infrastructure in place to allow the use of
effective technology can differ greatly depending on a person’s geographical
location. • Those in rural locations may have less infrastructure that those in
cities. • Those in third world countries may have less infrastructure that
those in third world countries. • If the infrastructure is not available, a
person may not be able to use the technology available
4 Explain how a person’s education can be
affected by the digital divide. [4]
Answer 4
All of the following [4]: • Lots of resources are available on online learning
platforms. • People can use these resources to enhance their own learning. •
This can lead to improved opportunities for people, including better job
opportunities. • If people cannot access these learning resources, they may
find that they are behind others in their education and cannot access the same
opportunities.
5 Explain two strategies that can be
implemented to reduce the digital divide. [4]
Answer 5
Any four from the following [4]: • The use of satellite technology • … this can
provide access to the internet to those in remote locations and where the
infrastructure is not in place.
Government
promotes the business and products that could be on offer • … in hope that
other countries will invest in their infrastructure to allow them to utilise
the necessary technology. • Company initiatives that encourage the recycling
and donation of technology • … these can then be given to those in
circumstances that may mean they cannot afford to but the technology. • The use
of classes to teach the use of the technology • … this can be especially useful
for older people who may not feel confident in using technology
Technology leapfrogging refers to skipping older technologies and directly adopting newer innovations. Example:
Exam-style questions
1 Define the term ‘digital divide’. [1]
Answer1
The term refers to the technology divide between countries, demographic groups
and economic areas [1].
2 Identify two aspects that can create a
digital divide. [2]
Answer 2
Any two from the following [2]: • people living in cities vs people living in
rural areas. • people educated in using technology vs people uneducated in
using technology. • older people vs younger people. • areas that are more
industrially developed vs areas that are less industrially developed. •
different socio-economic groups.
3 Explain the impact of the digital divide on
a person’s geographical location. [4]
Answer 3
All of the following [4]: • The infrastructure in place to allow the use of
effective technology can differ greatly depending on a person’s geographical
location. • Those in rural locations may have less infrastructure that those in
cities. • Those in third world countries may have less infrastructure that
those in third world countries. • If the infrastructure is not available, a
person may not be able to use the technology available
4 Explain how a person’s education can be
affected by the digital divide. [4]
Answer 4
All of the following [4]: • Lots of resources are available on online learning
platforms. • People can use these resources to enhance their own learning. •
This can lead to improved opportunities for people, including better job
opportunities. • If people cannot access these learning resources, they may
find that they are behind others in their education and cannot access the same
opportunities.
5 Explain two strategies that can be
implemented to reduce the digital divide. [4]
Answer 5
Any four from the following [4]: • The use of satellite technology • … this can
provide access to the internet to those in remote locations and where the
infrastructure is not in place.
Government
promotes the business and products that could be on offer • … in hope that
other countries will invest in their infrastructure to allow them to utilise
the necessary technology. • Company initiatives that encourage the recycling
and donation of technology • … these can then be given to those in
circumstances that may mean they cannot afford to but the technology. • The use
of classes to teach the use of the technology • … this can be especially useful
for older people who may not feel confident in using technology
Chapter 7: Expert Systems
Q1: What is an expert system?
A:
An expert system is a computer program that mimics human decision-making by using a knowledge base and inference engine. It helps in solving complex problems within specific domains.
Q2: What are the main components of an expert system?
A:
- Knowledge Base – Contains facts and rules about the domain.
- Inference Engine – Applies logical rules to the knowledge base to deduce new facts.
- User Interface – Allows users to interact with the system.
Q3: Give two examples of expert systems and their applications.
A:
- Medical Diagnosis Systems – Help doctors diagnose diseases based on symptoms (e.g., MYCIN).
- Financial Analysis Systems – Assist in fraud detection and stock market predictions.
Q4: What are the advantages and disadvantages of expert systems?
A:
Advantages Disadvantages Provide fast and accurate decisions Cannot handle unexpected situations Reduce human error High development costs Can work 24/7 Requires frequent updates
Q5: Compare expert systems and human experts.
A:
Feature Expert System Human Expert Speed Faster Slower Learning Cannot learn on its own Can adapt and learn Decision-making Based on rules Uses experience and intuition
Q6: What is the role of artificial intelligence (AI) in expert systems?
A:
AI enhances expert systems by:
- Allowing machine learning to improve decision-making.
- Enabling natural language processing (NLP) for user interaction.
- Using neural networks to process complex patterns.
Exam-style questions
1 Identify the name of the component in an
expert system that stores the data required for the system to use in decision
making. [1]
AI enhances expert systems by:
Exam-style questions
1 Identify the name of the component in an expert system that stores the data required for the system to use in decision making. [1]
Answer 1 Knowledge base [1].
2 Identify the name of the component in an expert
system responsible for reasoning and judgement. [1]
2 Identify the name of the component in an expert system responsible for reasoning and judgement. [1]
Answer 2 Inference engine [1].
3 Explain the role of an expert system. [2]
3 Explain the role of an expert system. [2]
Answer 3 All of the following [2]: • The role of an expert system is to attempt to reproduce the decision-making process of a human being. • The role of an expert system is to try and replicate the judgement of a human that has an expert knowledge in a certain field.
4 Describe the concept of forward chaining. [3]
4 Describe the concept of forward chaining. [3]
Answer 4 Any three from the following [3]: • Forward chaining is based on data driven reasoning. • It is dependent on the data that it is provided with. • It is better for solving open-ended problems. • The system takes data input by the user, then moves from rule to rule to provide a possible outcome
5 Identify the type of problem for which
backward chaining would be more suitable. [1]
Answer 5
A goal driven problem [1]. 6 Explain two scenarios where an expert
systems can be used. [4]
Answer 6
Any two from the following (2 marks per bullet) [4]: • An expert system could
be used to self-diagnose medical conditions … a user can input medical symptoms
and gain an understanding of what medical conditions this could be. • An expert
system could be used to diagnose a fault on a car … a car can be attached to an
expert system that will analyse data from the car and find the fault. • An
expert system can be used to act as an opponent in a game … the game could use
the data input by the user to make decisions about the game play of the
opponent. • An expert system can be used as a tool in financial planning … the
user can input their financial details and the system can help with processes
such as managing their debt. • An expert system can be used as a tool in
providing insurance … the user can input their personal data and the system can
tell them what insurance products are available to them. • An expert system can
be used to find out the identification of a plant or an animal … the user can
input data about the features and characteristics of the item and the system
can provide information about what it thinks it is. • An expert system can be
used to help plan out delivery schedules … the deliveries a driver needs to
make can be input into the system and the system can plan the best route for
making the deliveries.
5 Identify the type of problem for which backward chaining would be more suitable. [1]
6 Explain two scenarios where an expert
systems can be used. [4]
Chapter 10: Database and File Concepts
Q1: What is the difference between a flat file and a relational database?
A:
Flat File Database | Relational Database |
---|---|
Stores all data in a single table | Uses multiple related tables |
Data redundancy is high | Reduces redundancy using relationships |
Less efficient for complex queries | Efficient and scalable for large data |
Q2: Explain the terms "Primary Key" and "Foreign Key".
A:
- Primary Key – A unique identifier for a record in a table (e.g., StudentID in a Student table).
- Foreign Key – A field in one table that references a primary key in another table to establish a relationship.
Q3: What are the advantages of using a database management system (DBMS)?
A:
- Data Integrity – Ensures accuracy and consistency of data.
- Data Security – Provides user access control and encryption.
- Reduced Data Redundancy – Avoids duplication through normalization.
- Multi-User Access – Allows multiple users to access the database simultaneously.
Q4: What is normalization, and why is it important?
A:
Normalization is the process of organizing a database to reduce redundancy and improve efficiency.
Importance:
- Minimizes data duplication
- Ensures data consistency
- Improves query performance
Q5: What are the advantages of using a relational database over a spreadsheet?
A:
- Data Integrity – Reduces data redundancy.
- Multi-user Access – Supports concurrent users.
- Security – Provides access control.
- Efficient Queries – Faster data retrieval using SQL.
Q6: What is the difference between a foreign key and a composite key?
A:
- Foreign Key – A field in one table that links to a primary key in another table.
- Composite Key – A combination of two or more fields that uniquely identify a record.
Q7: Explain the ACID properties of database transactions.
A:
ACID properties ensure reliable transactions:
- Atomicity – A transaction is either fully completed or fully undone.
- Consistency – Ensures that a database remains in a valid state.
- Isolation – Transactions do not interfere with each other.
- Durability – Data remains saved even after system failure.
Q8: What is the difference between indexing and hashing in databases?
A:
Feature | Indexing | Hashing |
---|---|---|
Purpose | Speeds up searches | Quickly retrieves records |
Method | Uses B-Trees | Uses hash functions |
Example | Searching by name in a phonebook | Finding an employee by ID |
No comments:
Post a Comment