Wednesday, February 12, 2025

 

Chapter 5: eSecurity

Q1: What is eSecurity and why is it important?

A:
eSecurity refers to measures taken to protect digital systems, networks, and data from unauthorized access, cyber threats, and data breaches. It is important because it:

  • Prevents data loss and theft
  • Protects personal and financial information
  • Maintains system integrity and confidentiality
  • Ensures business continuity

Q2: What are the three key principles of information security?

A:
The three key principles are CIA (Confidentiality, Integrity, Availability):

  1. Confidentiality – Ensures that only authorized users can access sensitive data.
  2. Integrity – Ensures that data is accurate and has not been altered.
  3. Availability – Ensures that authorized users can access data when needed.

Q3: What are some common cyber threats and how can they be prevented?

A:

Cyber ThreatDescriptionPrevention
PhishingFraudulent emails tricking users into revealing informationDo not click unknown links, verify sender
MalwareMalicious software that damages systemsUse antivirus, update software regularly
Denial of Service (DoS)Overloading a system to make it unavailableUse firewalls and traffic monitoring
SQL InjectionInserting malicious SQL commands to access databasesUse parameterized queries, input validation

Q4: What are the differences between symmetric and asymmetric encryption?

A:

FeatureSymmetric EncryptionAsymmetric Encryption
Keys UsedSame key for encryption & decryptionPublic key for encryption, private key for decryption
SpeedFasterSlower
SecurityLess secure if the key is exposedMore secure
ExampleAES, DESRSA, ECC

Q5: What is a firewall, and how does it improve security?

A:
firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • It blocks unauthorized access.
  • It prevents malware from entering a network.
  • It filters harmful or unwanted traffic.

Q6: What is two-factor authentication (2FA) and why is it important?

A:
Two-factor authentication (2FA) is a security process requiring two different forms of verification (e.g., password + OTP). It enhances security by:

  • Reducing unauthorized access
  • Adding an extra security layer even if the password is stolen

Q7: What are biometric security measures? Provide examples.

A:
Biometric security measures use unique physical or behavioral characteristics for authentication. Examples:

  • Fingerprint scanning – Used in smartphones and access control
  • Facial recognition – Used in airports and secure devices
  • Iris scanning – Used in high-security environments

Exam-style questions

1 Identify three guidelines that can help keep personal data safe. [3]

 Answer 1 Any three from the following [3]: • Set strong passwords. • Encrypt personal data. • Use a firewall to monitor traffic. • Regularly scan computer with detection and prevention software. • Only visit and use trusted sources. • Do not open any email attachments from unknown and untrusted sources. • Check the URL of any link. Be cautious about any personal data shared. • Set all privacy settings to the most secure setting. • Report and block suspicious activity.

 

2 Explain one difference between phishing and pharming. [1]

 Answer 2: Phishing involves clicking a link in an email that takes a user to the fake website, whereas pharming downloads malicious code onto a user’s computer that redirects them to the fake website [1].

 

3 Explain two similarities between phishing and pharming. [2]

 Answer  3 All of the following [2]: • They can both involve a user receiving a fake email. • They are both designed to collect a user’s personal data.

 4 Identify four different types of malware. [4]

 Answer  4 Any four of the following [4]: • virus • trojan • worm • spyware • adware • rootkit • malicious bots • ransomware.

 

5 Describe how a firewall can be used to help prevent a virus infecting a computer system. [5]

 Answer  5 All of the following [5]: • Firewall monitors incoming and outgoing traffic from a computer system. • User can set rules and criteria for the data, which could include detecting known viruses. • User can close certain ports on firewall that are often used by hackers to infiltrate a firewall. • Firewall compares traffic to rules and criteria set. • Firewall can decline traffic if it does not meet the rules and criteria set.

 

6 Describe how spyware can be used to obtain a user’s password for an online account. [5]

 Answer  6 Any five of the following [5]: • A user could click a link / open an attachment / download software that could trigger the download of spyware onto the user computer. • The spyware could be software, such as a key logger. • The spyware will record all the keypresses the user makes. • The recorded keypresses are sent to a third party. • The third party analyses the data looking for patters and trends. If a patter is identified, this could be data that is used as a password.

 

7 Rootkits can be used to allow an authorised person to hide illegal files on a user’s computer. a State what is meant by a rootkit. [1] b Explain how the risk of rootkits can be minimised. [2] c Identify two other malicious ways that rootkits can be used. [2] [Total 5]

 Answer  7 a A rootkit is a computer program that enables a person to gain administrator access to a victim’s computer [1]. b Any one of the following (2 marks per bullet) [2]: • Set a strong password for the computer. • Only download data from trusted sources. • Don’t insert a USB that you find into your computer. c All of the following [2]: • Steal a user’s personal data. • Use the user’s computer as part of a larger cyber security attack.

 

8 Ransomware can be used to prevent a user gaining access to their data. a State how ransomware prevents the user gaining access to their data. [1] b Explain two measures that can be taken to minimise the risk of ransomware. [2]

 Answer  8 a It encrypts the data [2]. b Any two from the following [2]: • Store data in the cloud. • Keep an up-to-date backup of data, away from the computer system. • Only open and use software from trusted sources

Chapter 6: The Digital Divide

Q1: What is the digital divide and what are its causes?

A:
The digital divide is the gap between individuals, communities, or countries in accessing and using digital technologies.

Causes include:

  1. Economic factors – Some people cannot afford devices or internet access.
  2. Geographical location – Rural areas may lack broadband infrastructure.
  3. Education & Skills – Lack of digital literacy limits technology use.
  4. Government Policies – Poor investment in IT infrastructure widens the gap.

Q2: How can the digital divide be reduced?

A:

  1. Government investment in internet infrastructure
  2. Providing affordable devices and internet services
  3. Offering digital literacy programs in schools and workplaces
  4. Encouraging public-private partnerships for technology access

Q3: How does the digital divide impact education?

A:

  • Students without internet access struggle with online learning.
  • Lack of digital devices reduces engagement and learning opportunities.
  • Limits access to educational resources like e-books and research papers.

Q4: What is the role of governments in bridging the digital divide?

A:
Governments can:

  1. Invest in IT infrastructure (broadband expansion).
  2. Offer subsidies for devices and internet access.
  3. Introduce digital literacy programs in schools and communities.
  4. Encourage public-private partnerships to promote technology access.

Q5: Explain the term ‘technology leapfrogging’ in relation to the digital divide.

A:
Technology leapfrogging refers to skipping older technologies and directly adopting newer innovations. Example:

  • Developing countries adopting mobile banking instead of traditional banking.
  • Using solar-powered internet instead of building expensive infrastructure.

Exam-style questions

 1 Define the term ‘digital divide’. [1]
 
 Answer1 The term refers to the technology divide between countries, demographic groups and economic areas [1].
 
2 Identify two aspects that can create a digital divide. [2]
 
 Answer 2 Any two from the following [2]: • people living in cities vs people living in rural areas. • people educated in using technology vs people uneducated in using technology. • older people vs younger people. • areas that are more industrially developed vs areas that are less industrially developed. • different socio-economic groups.
 
3 Explain the impact of the digital divide on a person’s geographical location. [4]

 Answer 3 All of the following [4]: • The infrastructure in place to allow the use of effective technology can differ greatly depending on a person’s geographical location. • Those in rural locations may have less infrastructure that those in cities. • Those in third world countries may have less infrastructure that those in third world countries. • If the infrastructure is not available, a person may not be able to use the technology available
 
4 Explain how a person’s education can be affected by the digital divide. [4]
 
 Answer 4 All of the following [4]: • Lots of resources are available on online learning platforms. • People can use these resources to enhance their own learning. • This can lead to improved opportunities for people, including better job opportunities. • If people cannot access these learning resources, they may find that they are behind others in their education and cannot access the same opportunities.
 
5 Explain two strategies that can be implemented to reduce the digital divide. [4]
 
 Answer 5 Any four from the following [4]: • The use of satellite technology • … this can provide access to the internet to those in remote locations and where the infrastructure is not in place.
Government promotes the business and products that could be on offer • … in hope that other countries will invest in their infrastructure to allow them to utilise the necessary technology. • Company initiatives that encourage the recycling and donation of technology • … these can then be given to those in circumstances that may mean they cannot afford to but the technology. • The use of classes to teach the use of the technology • … this can be especially useful for older people who may not feel confident in using technology

Chapter 7: Expert Systems

Q1: What is an expert system?

A:
An expert system is a computer program that mimics human decision-making by using a knowledge base and inference engine. It helps in solving complex problems within specific domains.


Q2: What are the main components of an expert system?

A:

  1. Knowledge Base – Contains facts and rules about the domain.
  2. Inference Engine – Applies logical rules to the knowledge base to deduce new facts.
  3. User Interface – Allows users to interact with the system.

Q3: Give two examples of expert systems and their applications.

A:

  1. Medical Diagnosis Systems – Help doctors diagnose diseases based on symptoms (e.g., MYCIN).
  2. Financial Analysis Systems – Assist in fraud detection and stock market predictions.

Q4: What are the advantages and disadvantages of expert systems?

A:

AdvantagesDisadvantages
Provide fast and accurate decisionsCannot handle unexpected situations
Reduce human errorHigh development costs
Can work 24/7Requires frequent updates

Q5: Compare expert systems and human experts.

A:

FeatureExpert SystemHuman Expert
SpeedFasterSlower
LearningCannot learn on its ownCan adapt and learn
Decision-makingBased on rulesUses experience and intuition

Q6: What is the role of artificial intelligence (AI) in expert systems?

A:
AI enhances expert systems by:

  • Allowing machine learning to improve decision-making.
  • Enabling natural language processing (NLP) for user interaction.
  • Using neural networks to process complex patterns.

Exam-style questions

 1 Identify the name of the component in an expert system that stores the data required for the system to use in decision making. [1]

 Answer 1 Knowledge base [1].

 2 Identify the name of the component in an expert system responsible for reasoning and judgement. [1]

 Answer 2 Inference engine [1].

 3 Explain the role of an expert system. [2]

 Answer 3 All of the following [2]: • The role of an expert system is to attempt to reproduce the decision-making process of a human being. • The role of an expert system is to try and replicate the judgement of a human that has an expert knowledge in a certain field.

 4 Describe the concept of forward chaining. [3]

 Answer 4 Any three from the following [3]: • Forward chaining is based on data driven reasoning. • It is dependent on the data that it is provided with. • It is better for solving open-ended problems. • The system takes data input by the user, then moves from rule to rule to provide a possible outcome

 5 Identify the type of problem for which backward chaining would be more suitable. [1]

Answer 5 A goal driven problem [1]. 

6 Explain two scenarios where an expert systems can be used. [4]

Answer 6 Any two from the following (2 marks per bullet) [4]: • An expert system could be used to self-diagnose medical conditions … a user can input medical symptoms and gain an understanding of what medical conditions this could be. • An expert system could be used to diagnose a fault on a car … a car can be attached to an expert system that will analyse data from the car and find the fault. • An expert system can be used to act as an opponent in a game … the game could use the data input by the user to make decisions about the game play of the opponent. • An expert system can be used as a tool in financial planning … the user can input their financial details and the system can help with processes such as managing their debt. • An expert system can be used as a tool in providing insurance … the user can input their personal data and the system can tell them what insurance products are available to them. • An expert system can be used to find out the identification of a plant or an animal … the user can input data about the features and characteristics of the item and the system can provide information about what it thinks it is. • An expert system can be used to help plan out delivery schedules … the deliveries a driver needs to make can be input into the system and the system can plan the best route for making the deliveries.

Chapter 10: Database and File Concepts

Q1: What is the difference between a flat file and a relational database?

A:

Flat File DatabaseRelational Database
Stores all data in a single tableUses multiple related tables
Data redundancy is highReduces redundancy using relationships
Less efficient for complex queriesEfficient and scalable for large data

Q2: Explain the terms "Primary Key" and "Foreign Key".

A:

  • Primary Key – A unique identifier for a record in a table (e.g., StudentID in a Student table).
  • Foreign Key – A field in one table that references a primary key in another table to establish a relationship.

Q3: What are the advantages of using a database management system (DBMS)?

A:

  1. Data Integrity – Ensures accuracy and consistency of data.
  2. Data Security – Provides user access control and encryption.
  3. Reduced Data Redundancy – Avoids duplication through normalization.
  4. Multi-User Access – Allows multiple users to access the database simultaneously.

Q4: What is normalization, and why is it important?

A:
Normalization is the process of organizing a database to reduce redundancy and improve efficiency.

Importance:

  • Minimizes data duplication
  • Ensures data consistency
  • Improves query performance

Q5: What are the advantages of using a relational database over a spreadsheet?

A:

  1. Data Integrity – Reduces data redundancy.
  2. Multi-user Access – Supports concurrent users.
  3. Security – Provides access control.
  4. Efficient Queries – Faster data retrieval using SQL.

Q6: What is the difference between a foreign key and a composite key?

A:

  • Foreign Key – A field in one table that links to a primary key in another table.
  • Composite Key – A combination of two or more fields that uniquely identify a record.

Q7: Explain the ACID properties of database transactions.

A:
ACID properties ensure reliable transactions:

  1. Atomicity – A transaction is either fully completed or fully undone.
  2. Consistency – Ensures that a database remains in a valid state.
  3. Isolation – Transactions do not interfere with each other.
  4. Durability – Data remains saved even after system failure.

Q8: What is the difference between indexing and hashing in databases?

A:

FeatureIndexingHashing
PurposeSpeeds up searchesQuickly retrieves records
MethodUses B-TreesUses hash functions
ExampleSearching by name in a phonebookFinding an employee by ID

No comments:

Post a Comment