Digital Devices
Transmitting Data
Operating Online
Protecting Data & Information
100

A device that uses electrical signals and has an input, process, storage and output.

What is a digital device?

100

Internally and externally.

What two ways is data transmitted?

100

File storage provided on third-party servers over the Internet.

What is Cloud storage.

100
  • Using obvious passwords such as your favourite pet, place or date of birth

  • Disclosing passwords with other users

  • Leaving devices open to other users, such as not locking a device when going for a break

  • Using the same login details for multiple website accounts

  • Posting information globally without thinking first as to whether it is sensible to do so

  • Using personal devices for business operations.

Ways in which data is put at risk.

200

Input devices

Output devices

Storage devices

Communication devices

Peripherals can be categorised as:

200

One uses copper or fibre optic cables and the other uses radio waves as the connection medium.

What's the difference between wired and wireless.

200

VPNs instead of remote desktop.

Which technology should businesses choose for remote working?

200

A weakness that can be exploited by a cyber criminal allowing them unauthorised access to a computer system. For example, a misconfigured firewall.

What is a vulnerability?

300

A system that sits between the computer's firmware (BIOS/UEFI) and applications. The vital link between software and hardware.

What is an operating system?

300

Crosstalk and interface bottlenecks.

What is the issue with parallel communication?

300

E.g. Twitter (X).

What is an example of a microblog website?

300


E.g. posting information globally without thinking first as to whether it is sensible to do so. Also, phishing.

400


A visual representation of defragmentation.

400

Run network cables up and down lift shafts.

What is one thing you shouldn't do, to avoid the effects of EMI on networking cabling in large multistory buildings.

400

What is an example of a Wiki website?

400

Companies publicly list what they want testing and the reward for any disclosed vulnerabilities.

What are bug bounties?

500

Specifications

?

?

Compatibility

?

Cost

Implementation

Security

Efficiency


?

Which ones are missing?

User experience

User needs

Connectivity

Productivity

500

Two walls and the bathroom plumbing are blocking the signal.

Why does the room at the bottom-right have lower signal strength?

500

Online discussions organised into threads. They are not designed for real-time communication between users. They can cover a wide user base which makes them useful for things such as tech support

Describe forums as an online community.

500

An attack where malicious content from one website is embedded into another. The content may even be used to cover up things like login forms, so that user credentials can be intercepted.

iframe injection attack.

M
e
n
u