0% found this document useful (0 votes)
32 views2 pages

Assignment Sheet 21 8 Safety and Security

Uploaded by

suleenterprises9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

Assignment Sheet 21 8 Safety and Security

Uploaded by

suleenterprises9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PREMIER EDUCATION SOCIETY’S

TRINITY INTERNATIONAL SCHOOL (IGCSE - A LEVEL)


STD. IX INFORMATION AND COMMUNICATION 2023-2024
TECHNOLOGY
ASSIGNMENT SHEET 21 –(Pages – 02)

Name: __________________ Roll No. ______ Date: ________

Safety and security

1. Use of computers can lead to health and safety risks.1A


Name three health risks. For each one, describe what causes the risk and
suggest a way of reducing or eliminating the risk.

2. Describe the main principles of Data Protection Act. (


Textbook Pg no.195)
3 a. What is meant by e-safety? 2
.a.
b. Describe five ways of ensuring e-safety.

4. Explain the following two terms: (4)


a. phishing
b. pharming

5. Biometrics is used as a security method in many applications.


 Complete the following table which identifies:
 comparative accuracy
 required input devices
 what can interfere with the biometric technique.

Biometric Comparative Input What can


technique accuracy devices interfere with
High Medium required biometric
() () technique?
Fingerprinting
Retina scans
Voice
recognition
Face recognition

Strictly For Private Internal Circulation only


2
6. Indicate () which of the following tasks are carried out by a firewall.
Task Carried out by a
firewall
Firewall can control employee misconduct or
carelessness, preventing them divulging
passwords.
Firewalls can examine traffic between a
user’s computer and the public network
(e.g. internet)
Firewalls can help to prevent viruses or
hackers entering the user’s computer or
computer network
Firewalls can be used to log all incoming and
outgoing traffic to allow later interrogation
by a network manager
Firewalls can prevent individuals on internal
networks from using their own modems to
by-pass the firewall.
Firewalls warn the user if software on their
computer is trying to access an external
data source (e.g. automatic software
update)
7 a. Explain the term SSL. (6.a i, c)
b. Five stages that occur when a user wants to access a secure website and
receive/send data from/to if are shown below. Put the five stages in their
correct order.
A If the web browser can authenticate the SSL certificate, it sends a
message back to the web server to allow communications to begin.
B The web server responds by sending a copy of its SSL certificate to the
user’s web browser.
C The user’s web browser sends a message so that it can connect with
the required website which is secured by SSL.
D Once the message is received, the web server acknowledges the web
browser and the SSL-encrypted two-way data transfer begins.
E The web browser requests that the web server identifies itself.
8. Explain what is meant by Personal data.
9. Explain why it is important to encrypt emails.
10. Which of the following are weak passwords and which are strong
passwords?
Explain your decision in each case.
i 25-Apr-2005
ii Password1
iii ChapTer@06
iv rX!3&tp%
v 111111”
**********

Strictly For Private Internal Circulation only

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy