Physical safety
Principles
Protection types
Data threats
eSafety
100

1 cause for physical injuries made by impact

What is heavy falling equipment?

100

____ data is is any information that relates to an identified or identifiable individual

What is personal data?

100

features/parts in secure passwords

is it a mix of uppercase,lowercase, digits, special characters? 

100

the data threat Pharming or Phishing is used in the manipulation of DNS

what is pharming? (domain name system- redirects to fraud website)

100

E-safety is...

is it about protecting individuals from risks in the online world and teaching them how to use the internet safely & responsibly?

200

Two causes for fire in workplace/ ICT lab

What is socket overload and overheated equipment?

200

The purpose of the Data Protection Act

Is it a legislation that controls/ governs the collection, storage, and processing of personal data?

200

Types of biometric security measures

what is Fingerprint recognition,Facial recognition,Iris recognition,Retina scan,Hand geometry,DNA analysis,Palm print recognition,Ear shape recognition?

*ATLEAST 3* 

200

Devices Most Vulnerable To Hacking

are they smart devices- phone, webcams, routers?

200

a record or trail of data that you leave behind when you use the internet

what is a digital footprint?

300

cause for trailing cables

are the cables being unorganised or insecure (improperly secured)?

300

3 threats that can be prevented by protecting personal data 

what are/ is-

identity theft, illegal trade of data (data is sold to 3rd party companies), misuse of information, held for ransom *only 3*

300

Reason for biometrics being safer than passwords 

is it because it relies on unique physical or behavioral characteristics that are difficult to replicate or steal?

300

The difference between Virus and Worm

Is it that a virus is a type of malicious software (malware) designed to attach itself to a legitimate file or program in order to spread from one system to another. similar to a virus but it does not modify the program. But a worm is a type of malware that can replicate itself and spread across computers and networks without needing a host file or any user interaction. It is self-contained, meaning it doesn’t need to attach to other programs or files to function?

300

it is online bullying that involves...

what is cyberbullying and could it involve the use of digital technologies— such as the internet, social media, messaging apps, or mobile phones—to deliberately harass, threaten, embarrass, or target another person.

400

The scientific discipline that designs and arranges workplaces, products, and systems to ensure they fit and adapt to the people who use them

What is Ergonomics

400

Avoiding private or inapropriate data disclosure

How is it Personal data must be kept confidential and protected through privacy settings on websites such as social media or strong passwords on websites where personal data is held or used.  Think before you post – consider what information could be gathered from your image or content.  Check website details about the collection, storage, and use of personal data?

400

A record that attests to a website's reliability and integretity

what is a digital certificate?

400

while at a bank, i may face some potential data threats that may steal my data by...

could it be keylogging-malware that records keystrokes to steal PIN/password and shoulder surfing- illegally observing someone's screen or keyboard getting their passwords or bank credentials?

400

value of keeping software up to date

Do you get security improvemnts and improved performance, new features?

500

3 ways to prevent different types of R.S.I 

how can we prevent strain for... by doing ...?

wrist, fingers-switch to ergonomic keyboard

back, neck- adjust chair, get ergonomic chair

eye pain, headaches- take frequent breaks, adjust monitor screen's light settings, do eye exercise 

500

4 acts / points in the DPA

Are the rules Personal data must be processed lawfully and transparently. Data should only be used for the purpose it was collected. Data must be accurate and kept up to date. Data should not be stored longer than necessary. Data must be protected from unauthorized access or breaches?

500

The purpose of the S at the end of HTTP. 

 what is Secure Socket Layer. Is it a protocol that creates a secure connection between a client computer and a server and can SSL also ensures that information communicated between a server and client stays private and cannot be intercepted or changed by unauthorized parties?

500

the primary purpose of adware 

Do they display unwanted advertisements?

500

Evaluate the importance of teaching eSafety to teenagers and suggest effective ways schools can help promote safe internet use.

Is it that Teaching eSafety to teenagers is important because they spend a lot of time online and are at risk of threats like cyberbullying, scams, and identity theft. Many teenagers may not fully understand the dangers of sharing personal information or posting inappropriate content. eSafety lessons help students learn how to protect themselves online, use strong passwords, recognise online threats, and behave responsibly on social media.

Schools can promote safe internet use by:

Including eSafety in lessons (e.g. PSHE or ICT).Running workshops or assemblies on online safety. Providing a safe way for students to report online problems. Involving parents to support safe use at home?

M
e
n
u