Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Grade XOL - ICT | Mid Term Notes

Bright Future International School, Doha-Qatar


CH # 6: Risks to Data and Personal Information
Q1: What are the risks to data and personal information?
Ans:
1. Unauthorised access
2. Deliberate damage by Malware
3. Accidental deletion

Q2: What is a Malware?


Malware is short for Malicious Software, that is created with the intention to do harm. For example:
Virus, Spyware etc

Q3: What can be the causes of accidental deletion?


Three main causes of accidental deletion are:
1. Keyboard key is pressed by accident
2. Format the media on wrong storage device
3. Device loses power unexpectedly

Q4: Explain briefly the terms Phishing and Pharming.


Phishing is the criminal activity of sending or having a website that is intended to trick someone
into giving away personal information, such as their bank account number or computer password.
Pharming is a technique in which criminals create fake versions of the trusted websites to trick
users into entering their login details, which are then used by criminals to access users accounts.

Q5: List down any three methods that can be used to secure data and personal information online.
Ans: Data and personal information can be secured by:
1. Firewalls
2. Encryption
3. Password, PIN and Biometrics

Q6: Define the following:

a) CAPTCHA
A computer program or system that can identify whether a user is a human or
computer

b) Bot
A computer program that can interact with the systems

c) Anti- Malware
It prevents malware from accessing or operating, it scans the computer files in real
time and allows users to scan files, folders or disks.

Page 1 of 8
Grade XOL - ICT | Mid Term Notes
d) Backup
Backup creates one or more copies of data. Backup is usually stored to an external
storage device, which makes the data secure.
e) Near field communication
Near Field Communication (NFC) technology allows users to make secure
transactions, exchange digital content, and connect electronic devices in a very
short range.

Q7: Write down three ways to tell a website is secure.


1. It should show padlock in the address area
2. Uses HTTPs instead of HTTP
3. The URL area turns green

Q8: Write down the good ideas for backup procedure.


1. Set automatic backups
2. Do not use optical media as it deteriorates over time
3. Store copies at multiple locations
4. Create more than one copy
5. One copy of data stored online

Q9: Differentiate between differential backup and incremental backup.


Differential backup:
It creates a copy of all the files that have changed since the last full backup.
Incremental backup:
It saves a copy of only the files that have changed since the last full or incremental backup.

Q10: Write any three parts of information you need to enter when paying online.
1. Card number
2. Expiry date
3. Three or four digit card security code

Q11: A strong password will help prevent others from accessing the user account. State two ways a
user could keep his password secure.
Create a password that is long, complex, and unique. Avoid using easily guessable information, such
as birthdays, names, or common words.
Q12: List two threats to data that is saved on CD.
Malicious software or viruses can infect the CD. The data on the CD may be at risk of corruption
due to factors like scratches, exposure to extreme temperatures, or poor handling.
Q13.State two ways of identifying a device on a network.
MAC Address , IP Address

Q14: State two reasons for identifying devices on a network.


Identifying devices helps in efficiently managing network resources.
Administrators can implement access controls, authentication mechanisms, and monitor for
unauthorized or suspicious activity, enhancing overall network security.

Page 2 of 8
Grade XOL - ICT | Mid Term Notes
Q15: Explain why NFC speeds up the payment process.
With NFC, user doesn't need to insert the card into a slot or swipe it, reducing the physical
interaction time required for the transaction.

Q16: Draw one straight line from each method of protecting a network to the correct use.

CH 7: Impact of the Internet


Q1: Write the difference between world wide web and the internet.
The internet is inter-connected networks of computers, while the world wide web is the web pages
that can be accessed through the internet.

Q2: List down any three protocols.


 IMAP (Instant message access protocol)
 FTP (File transfer protocol)
 VoIP (Voice over internet protocol)

Q3: Write any three uses of internet.


Communication: Email, instant messaging, and video conferencing enable people to
communicate globally in real-time.
Information Retrieval: The internet serves as a vast source of information, allowing users to
access data on a wide range of topics.
Education: Online courses, educational websites, and e-learning platforms provide opportunities
for distance learning and skill development.

Q4: What is collaborative working and flexible working?


Collaborative working allows work to be split into a number of individual tasks, each of which can
be done by a different employee.
Flexible working is a way of working that suits an employee's needs.
For example, it allows employees to decide the hours that they work or enables them to work from
home.

Page 3 of 8
Grade XOL - ICT | Mid Term Notes
Q5: Discuss some benefits and drawbacks of Collaborative working for employees.
Benefits:
Teamwork helps generate creative ideas by combining different skills and perspectives.
Collaboration exposes employees to various approaches, fostering continuous learning and skill
development.

Drawbacks:
Collaborative work may lead to conflicts due to differences in opinions or communication issues.
Teams may face issues when workload isn't evenly distributed, causing frustration among
members.

Q6: Discuss some benefits and drawbacks of flexible working for employees.
Benefits
Flexible working allows employees to better balance their professional and personal lives. This can
lead to increased job satisfaction and overall well-being.
Some individuals find that they are more productive when they have the flexibility to choose their
working hours or location.

Drawbacks
Remote work may lead to communication difficulties, as spontaneous interactions are reduced.
Working remotely may pose security risks, especially if employees are using personal devices.

Q7: Explain one reason why cyberbullying can be more distressing than in person bullying.
Ans: In cyberspace, individuals can hide behind screen names or profiles, making it difficult to
identify the bully. Additionally, the digital nature of cyberbullying means that hurtful messages,
images, or videos can spread quickly and reach a broader audience.

Q8: State three factors that affect unequal access to ICT.


Differences in income and financial resources can lead to unequal access to technology.
Varying levels of digital skills and literacy can contribute to unequal access. Differences in ICT
infrastructure, such as the availability and quality of internet connectivity, can affect access.

Q9: State three examples of services that are not available to those with limited or not access to
digital technologies.
1. Without access to digital technologies, the users cannot perform online banking.
2. Without access to digital technologies users may miss out on opportunities for remote
learning.
3. Individuals without digital access may find it challenging to make purchases and compare
prices.

Q10: Describe the ways in which greater access to network has affected society.
Greater network access has expanded educational opportunities. Online courses, e-learning
platforms, and educational resources are more accessible, allowing individuals to pursue education
at their own pace and often without geographical constraints.
The internet has created new avenues for economic activities. E-commerce platforms enable
businesses to reach a global audience, while freelancers and entrepreneurs can connect with
clients and partners worldwide.

Q11. What is digital Divide?


The gap between people who have access to digital devices and internet and people who do not.

Page 4 of 8
Grade XOL - ICT | Mid Term Notes
Q12: Discuss the impact of internet on how individuals socialise.
The internet lets us talk to people from all around the world. We can make friends and share ideas
with someone far away. Social media and messaging apps make it simple to keep in touch with
friends and family.
On contrary, spending a lot of time online might mean fewer face-to-face conversations. It's
important to find a balance between online and offline socializing. Communicating through text
and emojis can sometimes lead to misunderstandings. It's not always easy to convey emotions
accurately online. Sharing too much personal information online can be risky. It's crucial to be
careful about what you share to protect your privacy.

Q13: What are the three rules one should follow to stay safe online.
Ans: Zip it
Block it
Flag it

Q14: What is digital foot print?


Ans: A digital footprint –sometimes called an electronic footprint refers to the trail of data you
leave when using the internet.

Q15: What are cookies?


Ans: It is the information that a website stores on a user’s computer so that the website recognizes
the user when they use it again.
Choose the correct answer.

Q 16: Some people cannot go online because of their religious beliefs. List two other causes of
unequal access to ICT.
Ans: Digital Literacy and Education Disparities
Infrastructure
Social and Cultural Barriers

Q 17: The Internet has provided a wider range of entertainment and leisure opportunities. One
example is video and audio streaming. List two other examples.
Gaming and eSports
Social Media
Online shopping

Q 18: Pat has a desktop PC at home. The company that Pat works for allows staff to work from
home. This reduces her travel costs. State two other benefits to Pat of being able to work from
home.
Pat can save money on commuting expenses.
Pat can use the time spent commuting and utilize it for other productive activities
With the ability to work from home, Pat can achieve a better balance between her professional and
personal life.
Multiple Choice Questions.

Q1:What are the risks to data and personal information?


a) Unauthorized access
b) Deliberate damage by Malware
c) Accidental deletion
d) All of the above

Page 5 of 8
Grade XOL - ICT | Mid Term Notes
Q2: ___________ are the types of backup.
a) Differential
b) Incremental
c) Full Backup
d) All of these

Q3:______________ is a computer program or system that can identify whether a user is a


human or computer.
a) CAPTCHA
b) Bot
c) Robot
d) None of these

Q4:_________ is / are way(s) to tell a website is secure.


a) It should show padlock in the address area
b) Uses HTTPs instead of HTTP
c) The URL area turns green
d) All of these

Q5:Kay uses a range of software. Kay uses software to protect her from risks online. Which one of
these is an example of phishing?

a) Email pretending to be from a bank


b) Encrypting data
c) Redirecting web traffic to a fake site
d) Website code copied without permission

Q6:Judy sets file permissions on her online documents. Which one of these is a benefit of doing
this?
a) Improves encryption
b) Increases storage
c) Quicker backup
d) Secures data

Q7:Which one of these is a protocol used to transfer data on the Internet?


a) ISP
b) HTTPS
c) HTML
d) VPN

Q8:Kay works from home. She uses ICT for business and entertainment. Which one of these could
prevent the risk to Kay's work data caused by accidental deletion?
a) Anti-malware
b) Backup
c) Encryption
d) Phishing

Q9:Which one of these is a risk of phishing?


a) Connectivity fault
b) Data deletion
c) Fraudulent activity
d) Power reduction
Page 6 of 8
Grade XOL - ICT | Mid Term Notes
Q10:In what way has the internet affected social interactions?
a) Strengthened face-to-face communication
b) Reduced social connections
c) Limited access to social networks
d) Enhanced global connectivity through social media

Q11:How has the internet influenced the business landscape?


a) Hindered global trade
b) Decreased opportunities for entrepreneurship
c) Facilitated global trade and created opportunities for entrepreneurship

d) Increased economic isolation

Q12: How has the internet significantly impacted global communication and connectivity?
a) Restricted communication between countries
b) Improved global connectivity and communication
c) Reduced the need for communication
d) Limited the exchange of information

Q13: What is one major benefit of the internet concerning information access?
a) Limited access to information
b) Reduced availability of educational resources
c) Increased access to a vast amount of information
d) Slower access of news

Q14: What is a common challenge associated with the internet's impact on privacy?
a) Increased control over personal information
b) Decreased risk of identity theft
c) Growing concerns about data privacy and security
d) Limited access to personal data by third parties

Q15: Which one of these describes people who are 'information poor'?
a) Limited access to technology
b) Phishing victims
c) Rural communities using 4G technology
d) Write access, rather than read access

Q16: What is a key benefit of flexible working for employees?


a) Reduced productivity
b) Better work-life balance
c) Limited career advancement opportunities
d) Increased commuting time

Q17: What is a primary advantage of collaborative working for organizations?


a) Decreased innovation
b) Increased employee turnover
c) Enhanced problem-solving capabilities
d) Limited creativity

Page 7 of 8
Grade XOL - ICT | Mid Term Notes
Q18:Which of the following best describes flexible working?
a) Working fixed hours in the office
b) Working from home only
c) Having the freedom to choose when and where you work
d) Working overtime regularly

Q19: Collaborative working involves:


a) Working independently on tasks
b) Sharing knowledge and resources to achieve common goals
c) Competing with colleagues for recognition
d) Avoiding communication with team members

Q20: Which of the following is NOT a safe practice for sharing sensitive information online?
a) Sending it through an encrypted email
b) Posting it publicly on social media
c) Using secure file transfer services
d) Utilizing password-protected documents

Page 8 of 8

You might also like