Networks & Internet
Cloud Storage
Passwords & 2-Factor Auth
Biometrics
Conferencing & Collaboration
100

This device converts digital signals so they can travel over an analogue telephone line.

Modem

100

Storing files on large groups of remote networked servers accessed via the internet is called.

Cloud Storage

100

A password such as “12345” is commonly described with this adjective.

Weak

100

Unlocking a phone with a fingerprint uses this general method of authentication.

Biometric authentication.

100

A remote meeting that uses only voice (no images) is called this type of conferencing.

Audio-conferencing

200

It reads destination IP addresses and chooses the best path to another network.

Router

200

One everyday benefit: you can reach cloud-stored files from any device as long as you have this.

An internet connection

200

Name one feature that typically makes a password strong.

Any of: ≥8 characters, mixture of upper- & lower-case letters, digits, symbols, no dictionary words

200

Name two biometric identifiers other than fingerprints.

Any two of: face, iris, retina, hand geometry, voice, vein pattern.

200

Give one piece of hardware every participant needs to join a video conference.

e.g., webcam, microphone, camera-equipped phone/laptop

300

An internal expansion card that lets a computer connect to a LAN.

NIC

300

Give one security risk that exists because your cloud data is held on a third-party server.

Loss of direct control / increased chance of hacking / provider staff could access it.

300

In 2-factor authentication, a fingerprint belongs to which factor category?

Something you are” (biometric)

300

Give one reason automated facial-recognition can be more accurate than a manual visual check.

Electronic comparison reduces human error / can analyse subtle patterns quickly.

300

State one advantage of audio- over video-conferencing in a directors’ meeting.

Uses less bandwidth / cheaper equipment / eliminates lip-sync issues / affords more privacy

400

Smart LAN device that forwards incoming frames only to the intended port, not every port.

Switch

400

Besides subscription fees, name one long-term financial drawback of relying solely on cloud storage.

Ongoing costs can exceed buying local hardware over time

400

State the three classic categories of authentication factors.

Something you know, something you have, something you are.

400

Describe one common environmental factor that might cause a facial-recognition system to fail.

e.g., low light, glare, face covering, sunglasses, shadows.

400

Name one collaboration or communication difficulty that can arise because participants are in different time zones during a web-conference.

Scheduling live sessions may be hard / some attendees may have to join at inconvenient hours

500

What do the letters IP stand for and what essential job does an IP address perform?

Internet Protocol; it uniquely identifies a device so packets can be routed to it across networks

500

Explain (in one sentence) why permanently deleting a cloud file is harder than deleting a local file.

Multiple replicated copies may exist on many servers, so every replica and any backups must be erased before the data is truly gone.

500

Give one benefit and one drawback of using an extremely complex password like P@2zY1Cg93r8d.

Benefit: very hard to crack; Drawback: easy to forget / may need to be written down / easy to mistype

500

State one privacy concern and one technical concern linked to storing large biometric databases.

Privacy: biometrics can’t be changed if stolen; Technical: high storage/processing demands or system needs strong encryption to protect templates

500

Explain why a slow internet connection can produce lip-sync or lag in video calls and name one technical fix.

Video requires high bandwidth; if throughput drops, audio & video get out of sync. Fix: upgrade bandwidth, lower resolution, or use better compression.