Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Cambridge International AS and A Level

IT

Chapter 2 Review questions

1)

phishing is when an unauthorised person tries to gather personal data by disguising or


impersonating a trustworthy person or organisation. This is usually done in the form of phishing
emails which try to trick a user into logging in to a fake phishing website, which looks like a
legitimate website but is designed to steal the user’s login credentials or private information.

pharming is another method of collecting personal data by installing malicious code onto a computer
or server. When a user attempts to access a legitimate website, they will be redirected to a fake
phishing website. This can be done by hijacking the user’s DNS server, which maps domains to IP
addresses. It can also be done by changing the ‘hosts’ file on the user’s computer; this file overrides
DNS settings.

2)

A type of malware which encrypts all of the user’s files and demands a payment for decryption.
Usually, the only method for the user to recover their files is to pay, often using cryptocurrencies.

3)

Bots are applications that are programmed to repeatedly carry out certain tasks. These are usually
used by cybercriminals to bombard people with spam emails. Bots can also be used on instant
messaging services to try and trick users. Infected computers can also be turned into ‘zombie bots’,
which are used to collectively launch attacks on websites.

4)

Prevent identity theft

Identity theft occurs when someone gains access to your personal information and pretends to be
you online. Individuals who have accessed your personal data can retrieve your login information for
various websites or commit cybercrimes such as tax fraud, all while posing as you. Identity theft is
the type of crime that can have long-lasting repercussions for both your digital privacy and your
online reputation.

Protect your financial information

Cybercriminals can take your banking information and make unauthorized withdrawals, purchases,
and transfers. Although financial websites are encrypted, there are still steps you should take to
ensure your money is as safe as possible:

Don’t share your banking information with anyone

Use strong passwords

Enable 2-factor authentication

Only log in to online banking when you’re on your protected network at home

Protect your employability


Nearly 100 percent of employers do background checks on potential employees, and these
investigations examine your social media profiles, as well as data from public records available
online. To avoid damaging your online reputation, and thus sabotaging your career, you should
remove any personal information that might negatively influence a prospective employer.

5)

RSI (Repetitive Strain Injury): This is pain, numbness or weakness that occurs in the hands, arms,
shoulders and the neck. This is caused by repetitive movements such as typing or clicking and poor
posture. To prevent this, a good posture should be maintained and regular breaks should be taken.
Wrist rests can also be used to support a user’s wrists.

Back Pain and Muscle Spasms: Caused by poor posture. A user should sit on an adjustable chair with
proper back support.

6)

Fire: Computers can overheat and could cause fires. This can also occur because of overloaded plug
sockets. Computers should be used in rooms that are properly ventilated, with fire extinguishers
nearby. Plug sockets should not have too many devices plugged into them, especially those that
require a lot of power.

Electric Shock: This can occur if a user touches wires, especially if they are worn out. It can also
occur if liquids are spilt onto an electrical device. Caution should be taken when handling electrical
wires, and old ones should be repaired. Liquids should be kept away from electrical devices.

You might also like