Professional Documents
Culture Documents
ICT Assessment 2 - 38%
ICT Assessment 2 - 38%
Draw a diagram to show how Ken’s smartphone can be used to provide Jacob’s tablet
computer with an internet connection.
Label each component and the connectivity you use in your diagram. (4)
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(4)
4. Ken uses PIN to unlock his tablet.
List three other methods he could use to prevent unauthorized access to her data.
1. …………………………………………………………………………………………
…………………………………………………………………………………………
2. …………………………………………………………………………………………
…………………………………………………………………………………………
3. …………………………………………………………………………………………
………………………………………………………………………………………….
(3)
5. Ken uses a smartwatch when exercise.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
(2)
7. Robert works in a company that uses a local area network.
1. ………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………………………………………………………………
2. …………………………………………………………………………………………..
………………………………………………………………………………………………
………………………………………………………………………………………………
(2)
8. Personal data is often transmitted over the internet.
a. Using encryption
b. Filtering
c. Streaming
d. Using a firewall
(1)
9. To link network systems, you need a:
a. WAN
b. Gateway
c. Booster
d. Broadband connection
(1)
10. Identify one risk to the data stored on his computer when connected to the internet and for
each give two actions that can be taken to reduce the risk.
Risk ………………………………………………………………………………………
Action 1……………………………………………………………………………………
………………………………………………………………………………………………
Action 2……………………………………………………………………………………
………………………………………………………………………………………………
(3)
11. Many colleges restrict the websites that students may access.
a. Filter software
b. Editing software
c. Communication software
d. Web authoring software (1)
12. A device used to strengthen a wireless signal is:
a. An adaptor
b. An actuator
c. A tracker
d. A booster (1)
13. Jason has downloaded the images from his camera onto his laptop.
Give two reasons why he should also make backup copies of the images.
1………………………………………………………………………………………….
………………………………………………………………………………………………
…2………………………………………………………………………………………….
………………………………………………………………………………………………
…
(2)
14. Computer users are advised to create a strong password.
1………………………………………………………………………………………….
………………………………………………………………………………………………
…2………………………………………………………………………………………….
………………………………………………………………………………………………
…
(2)
Give two actions Jimmy should take to keep his password secure.
1………………………………………………………………………………………….
………………………………………………………………………………………………
…2………………………………………………………………………………………….
………………………………………………………………………………………………
…
(2)
16. Teaching staff, administrative staff and students are given file access rights.
17. Bob and John have created a home network to connect their PCs and printer.
State one other way a device on the network can be identified. (1)
………………………………………………………………………………………
18. Home networks can use both wired and wireless connection.
1………………………………………………………………………………………….
………………………………………………………………………………………………
…2………………………………………………………………………………………….
………………………………………………………………………………………………
…
(2)
19. Identify two disadvantages of using a wired rather than a wireless connection.
1………………………………………………………………………………………….
………………………………………………………………………………………………
…2………………………………………………………………………………………….
………………………………………………………………………………………………
…
(2)