Which Indian spice is often referred to as the "queen of spices" and is known for its vibrant yellow color?
Tumeric
DPA stands for what?
Data Protection Act
What are the things we can do during the Design Stage?
File and Data structure
Input Formats
Output Formats
Validation Routines
Which country shares the longest continuous border with China?
Mongolia
What does shoulder surfing mean?
A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information.
Decrypt the following! The key is shift thrice to the right:
Hvdihwb lv d pxvw
ABCDEFGHIJKLMNOPQRSTUVWXYZ
How many countries are there in Asia?
48
Give at least three examples of personal data and sensitive data
Personal Data: » name » address or email address » an ID card number/passport number » an IP address » cookie ID » the advertising identifier on a mobile phone » date of birth » banking details » photographs of the individual (for example, in full school uniform).
Sensitive Data: ethnicity or race » political views » membership of a political party » membership of a trade union » religion/philosophical beliefs » sexual orientation/gender » criminal record » medical history » genetic data/DNA » biometric data
Describe how the firewall works?
A firewall can be software or hardware. A firewall will help to keep potentially destructive forces away from a user’s computer, by filtering incoming and outgoing network traffic.
What do you call the traditional Korean Dress?
Hanbok
Which of these e-safety strategies do you use every day when :Sending and receiving emails? Online Gaming? Social Media? Give one unique example of each activity.
Answer can be found on pg 197 - 199
State all the steps in the system life cycle.
Analysis
Design
Development and Testing
Implementation
Documentation
Evaluation
A Japanese animated film that came out in 2016 it became a box office success eventually becoming the highest grossing animated film in Japan.
Your Name
Give all 6 examples of malware. Briefly describe each.
Virus - This is program code or software that can replicate/copy itself with the intention of deleting or corrupting files on a computer.
Worms are a type of stand-alone virus that can self-replicate.
Trojan horse is a malicious program which is often disguised as some legitimate software.
Key logging software (or key loggers) is a form of spyware. It gathers information by monitoring a user’s keyboard activities carried out on their computer.
Adware will attempt to flood an end-user with unwanted advertising.
Ransomware are programs that encrypt data on a user’s computer and ‘hold the data hostage"
Give at three examples of Sensors
Temperature, Pressure, Light, pH, Humidity, Sound