100% found this document useful (1 vote)
100 views9 pages

1 2 2-Security-Aspects

Security

Uploaded by

Riaz Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
100 views9 pages

1 2 2-Security-Aspects

Security

Uploaded by

Riaz Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

QUESTION 1.

1 (a) Four statements about cookies are shown in the table below.

Study each statement.

Tick (✓) to show whether the statement is true or false.

Statement True False


they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]

(b) Five descriptions and five security issues are shown below.

Draw a line to connect each description to the correct security issue.

Description Security issue

malicious code installed on the hard drive of a


user’s computer or on the web server; this code
hacking
will re-direct user to a fake web site without their
consent

software that gathers information by monitoring


key presses on a user’s computer and relays
pharming
the information back to the person who sent the
software

program or code that replicates itself and is


designed to amend, delete or copy data and files phishing
on a user’s computer without their consent

the act of gaining illegal access to a computer


spyware
system without the owner’s consent

creator of code sends out a legitimate-looking


email in the hope of gathering personal and
virus
financial data; it requires the recipient to follow a
link in the email or open an attachment

[4]

© UCLES 2015 0478/12/M/J/15


QUESTION 2. 10

8 (a) Five statements and three types of software are shown below.

Draw lines to connect each statement with the correct type of software.

Statement Type of software

Users have the freedom to pass on


the software to friends and family as
they wish.

Free software

Users can download this software free


of charge, but they cannot modify the
source code in any way.

Users are allowed to try out the


software for a trial period only before Freeware
being charged.

Users can study the software source


code and modify it, where necessary,
to meet their own needs, without
breaking copyright laws.

Shareware

Users can obtain a free trial version


of the software, but this often does
not contain all the features of the full
version.

[3]

© UCLES 2016 0478/12/M/J/16


11

(b) Describe three ethical issues that should be considered when using computers.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Security of data is very important.

Three security issues are viruses, pharming and spyware.

Explain what is meant by each issue.

Viruses: .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Pharming: .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Spyware: ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2016 0478/12/M/J/16 [Turn over


12

(d) Describe three tasks carried out by a firewall.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

9 In the following barcode, each binary number is made up of seven bars.

Each bar is black or grey.

A black bar is interpreted as a “1” and a grey bar is interpreted as a “0”.

(a) Write the binary numbers that would be produced from this barcode:

%LQDU\QXPEHU$ %LQDU\QXPEHU%

Binary number A:

Binary number B:
[2]

(b) This barcode system uses odd parity.

Write the parity bit for each of the binary numbers in part (a):

Parity bit

Binary number A:

Binary number B:
[2]
© UCLES 2016 0478/12/M/J/16
QUESTION 3. 2

1 There are a number of security risks associated with using the Internet.

Name three of these risks. For each, state why it is a risk and describe how the risk can be
minimised.

Security risk 1 ...................................................................................................................................

Why it is a risk ..................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

How to minimise the risk ..................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Security risk 2 ...................................................................................................................................

Why it is a risk ...................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

How to minimise the risk ..................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Security risk 3 ...................................................................................................................................

Why it is a risk ..................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

How to minimise the risk ..................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

[9]

© UCLES 2015 0478/12/O/N/15


QUESTION 4. 8

4 (a) Computer ethics involves a number of different topics.

(i) A student made the following statement on an examination paper:

“It allows a user to have the freedom to run, copy, change and adapt the software and
then pass it on to a colleague, friend or family member.”

Identify which computer term the student was describing.

...................................................................................................................................... [1]

(ii) Explain what is meant by computer ethics.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(b) The four statements below refer to firewalls and proxy servers.

Study each statement.

Tick (9) the appropriate column(s) to indicate whether the statement refers to a firewall
and/or a proxy server.

Statement Firewall Proxy server

Speeds up access of information from a web server by


using a cache

Filters all Internet traffic coming into and out from a


user’s computer, intranet or private network

Helps to prevent malware, including viruses, from


entering a user’s computer

Keeps a list of undesirable websites and IP addresses

[4]

© UCLES 2015 0478/13/O/N/15


9

(c) Explain three ways of preventing accidental loss or corruption of data.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2015 0478/13/O/N/15 [Turn over


Buy IGCSE, O / A Level Books, Past Papers & Revision Notes Online at Discounted Prices across Pakistan
Visit: www.TeachifyMe.com / Shop Call / WhatsApp: (0331-9977798)
QUESTION 5. 3

2 An electronic guessing game compares denary integer values input by a user with pre-stored
values. The pre-stored values are held in 10-bit binary format.

(a) Convert the binary values in the table to denary.

Binary Denary

0001001110

0110110111

1000000001
[3]

(b) When planning the game, the designer decided to use hexadecimal notation to represent the
binary values.

Explain why the designer used hexadecimal notation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) State the hexadecimal equivalent of the binary value 1010110101

............................................................................................................................................. [3]

3 A company has several offices. It uses the Internet to transfer data between offices. The company
also makes payments to staff and suppliers using online banking.

The company are concerned about spyware and other security aspects of using the Internet.

(a) Explain what is meant by spyware and how it is used to obtain data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]
© UCLES 2019 0478/11/O/N/19 [Turn over
Buy IGCSE, O / A Level Books, Past Papers & Revision Notes Online at Discounted Prices across Pakistan
Visit: www.TeachifyMe.com / Shop Call / WhatsApp: (0331-9977798)
4

(b) The company uses a web page to log on to the online bank.

Identify one method that could be used by the online bank to reduce the impact of spyware
when logging on.

State how the method prevents the use of spyware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The company has installed a firewall as part of its data security.

Describe how a firewall can help protect against unauthorised access to data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) State two other methods the company could use to help prevent unauthorised access to
data.

Method 1 ...................................................................................................................................

Method 2 ...................................................................................................................................
[2]

© UCLES 2019 0478/11/O/N/19

You might also like