Design Tools
HCI
Data Types/ Collection
Data Storage
Cyber Threats
100

Identify one feature of a mind map

- Title/ central bubble
- Nodes
- Subnodes
- Linking lines

100

What does HCI stand for?

Human Computer Interface

100

What type of data is "40%"?

Numeric

100
Name one type of external storage device

- External HDD
- External SSD
- USB Flash Drive
- NAS device
- Portable Wireless Drive

100

State one type of malware, other than virus

Adware, botnet, ransomware, spyware, trojan horse, worm

200

State one advantage of using wireframes

Fast, saves time in the long run, can show others basic idea early.

200

State one advantage for using HCIs when banking, rather than doing this in person.

Faster, more secure, fewer mistakes made

200

State two primary data collection methods

Email, questionnaire/survey, interview

200

What is "the cloud"?

Storage that can be remotely accessed through the internet - connected on a server which is connected to the internet

200

What does DoS stand for?

Denial of Service

300

Name the three types of mind map

- Library
- Presentation
- Tunnel timeline

300

Two types of screen are LED and LCD, but what do these stand for?

Light emitting diode

Liquid crystal display

300

Describe how the "presence check" data validation tool works.

Makes sure something is entered

300

What do HDD and SSD stand for?

Hard Drive Disk
Solid State Drive

300

Describe how information can be stolen by phishing.

Fake website that looks real, people enter their details

400

Describe three features of a flow chart

- Terminator (start/end)
- Rectangles (Processes)
- Diamond (decisions)
- Arrows

400

State 4 types of digital platform

Website
Mobile App
Database
Spreadsheet

400

What is the formula for converting data into information.
Information = Data + ? + ?

Structure and Context

400

Describe one disadvantage of using a bluetooth portable wireless drive.

- Not very secure/ signal easily intercepted
- Small device, so easily lost or misplaced

400

Describe how the Quid Pro Quo cyber attack works.

Someone calls offering help, in the process of helping steals data or installs malware.

500
Describe one advantage and one disadvantage of using a visualisation diagram

+ Information quickly understood
+ Patterns/ trends easily identified
+ Easy to understand (expertise not required)
- Not suitable for timeline (like video)
- Open to interpretation
- Not suitable for larger projects

500

Describe one advantage and one disadvantage of using "Touch" as an interaction method.

+ Quicker than mouse/ keyboard
+ Straightforward to use
+ Easy to clean
- Cost
- Accuracy can be an issue
- Sensitivity of screen
- Screen size must be appropriate

500

Describe how the "lookup" data validation tool works

The response is checked against a list of valid responses

500

Describe two advantages of using an SSD over an HDD.

- Faster data transfer
- Lighter
- Quieter (no moving parts)
- More robust
- Use less power

500

Describe the three types of hacking

White hat - testing security
Grey hat - For fun, usually fixes problems for free
Black hat - malicious