Anything Asian Trivia
Chapter 8
Randomizer 1
100

Which Indian spice is often referred to as the "queen of spices" and is known for its vibrant yellow color?

Tumeric

100

DPA stands for what?

Data Protection Act

100

What are the things we can do during the Design Stage?

File and Data structure

Input Formats

Output Formats

Validation Routines

200

Which country shares the longest continuous border with China?

Mongolia

200

What does shoulder surfing mean?

A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information.

200

Decrypt the following! The key is shift thrice to the right:

Hvdihwb lv d pxvw

ABCDEFGHIJKLMNOPQRSTUVWXYZ

Esafety is a must
300

How many countries are there in Asia? 

48

300

Give at least three examples of personal data and sensitive data

Personal Data: » name » address or email address » an ID card number/passport number » an IP address » cookie ID » the advertising identifier on a mobile phone » date of birth » banking details » photographs of the individual (for example, in full school uniform). 

Sensitive Data: ethnicity or race » political views » membership of a political party » membership of a trade union » religion/philosophical beliefs » sexual orientation/gender » criminal record » medical history » genetic data/DNA » biometric data 

300

Describe how the firewall works?

A firewall can be software or hardware. A firewall will help to keep potentially destructive forces away from a user’s computer, by filtering incoming and outgoing network traffic.

400

What do you call the traditional Korean Dress?

Hanbok

400

Which of these e-safety strategies do you use every day when :Sending and receiving emails? Online Gaming? Social Media? Give one unique example of each activity.

Answer can be found on pg 197 - 199

400

State all the steps in the system life cycle.

Analysis

Design

Development and Testing

Implementation

Documentation

Evaluation

500

A Japanese animated film that came out in 2016 it became a box office success eventually becoming the highest grossing animated film in Japan.

Your Name

500

Give all 6 examples of malware. Briefly describe each.

Virus - This is program code or software that can replicate/copy itself with the intention of deleting or corrupting files on a computer.

Worms are a type of stand-alone virus that can self-replicate. 

Trojan horse is a malicious program which is often disguised as some legitimate software.

Key logging software (or key loggers) is a form of spyware. It gathers information by monitoring a user’s keyboard activities carried out on their computer. 

Adware will attempt to flood an end-user with unwanted advertising. 

Ransomware are programs that encrypt data on a user’s computer and ‘hold the data hostage"

500

Give at three examples of Sensors

Temperature, Pressure, Light, pH, Humidity, Sound