Professional Documents
Culture Documents
CH 2
CH 2
11(a)
Two from:
Type in a web address
Use a search engine
Type what you need on the search bar
11(b)
Four from:
The internet
Network of Networks//WAN
It is the infrastructure
Contains email, FTP
The World Wide Web
Collection of websites
Accessed from the internet
Service of the internet
To gain full marks the explanation must have correct answers for both the internet
and World Wide Web
7(c)
Four from:
Create a cloud storage account
Ensure sufficient storage in the cloud account
Log into the cloud at home
Upload/transfer the diagrams from his home computer to the cloud
At university: access/login to his cloud storage account
At university: download/access the stored diagrams
7 Four from:
Smartphone sends data to its Bluetooth connector
Data is converted to radio waves
The smartphone automatically detects nearby devices
The smartphone pairs to the other device if in range
The connection is established
Sends the radio wave to the other device
J22-11 (1)
Bridge Hub
J22-12 (3)
8 Six from:
Comparison
Both are network devices
Both are hardware devices
Both have computers and devices connected to them
Both send data to devices//Both are communication devices
Contrast
In a hub data packets/data are broadcast to every device connected to it
A hub is less secure than a switch in distributing data
Switch checks the data packet
Switch sends to an appropriate device
To gain full marks both contrast and comparison is needed
4(a) Switch
4(b) Hub
4(c) Router
4(d) Bridge
J22-12 (8)
8(a) 2193733.pdf
8(b) igcse-ICT-0417
8(c) www.cambridgeinternational.org
8(d) Secure internet protocol (hyper text transfer protocol secure)
J21-13 (5)
15
Four from:
Advantages
Files can be larger therefore it can save physical storage space
More likely to get the music you need
More likely to get more up to date music
Can be accessed in more places as only need the internet
Don’t need physical storage space
Don’t need optical drives to view/listen to movie/audio
Can be viewed on mobile devices with internet connection
Copyright owners have more control over who can watch the movie/listen to the audio as
no physical copy exists to be copied/pirated
Don’t have to wait for the whole/large file to be downloaded before viewing
Physical copies can be lost/stolen/damaged rendering them useless/have to buy again
but steamed movies are always available
Disadvantages
Needs a connection to the internet
Never own a physical copy of the file
The playback is dependent on the internet connection therefore may not be as good a
quality
A subscription may be needed to be paid therefore may be more expensive
To gain full marks there needs to be advantages and disadvantages
13 Four from:
Online discussion forum/social platform/website
Where the posts are controlled/monitored by an administrator
Those that break the rules are banned
Filters out inappropriate posts
Moderated forums have rules/policy
N21-13 (6)
6 Four from:
Online discussion forum/social platform/website
Do not have an administrator
Posts are not controlled/monitored
Relies on a voluntary code from its users
N21-13 (7)
• Virus
• Anti-virus
• Hacking
• Authentication
• Firewall
• Encryption
• Phishing
• Smishing
• Vishing
• Pharming
• Key logging
• Shoulder surfing
• Card cloning
• Non-policed internet
• SPAM
• Stealing personal info online
• E-safety
J22-11 (12)
J22-12 (14)
J22-13 (9)
J22-13 (12)
3
Max three from:
Weak password is easy to guess
Weak passwords consist of all letters or all digits or all digits with one letter/all letters
with one digit//words found in a dictionary//Strong passwords use a mixture of upper
case, lower case, symbols and digits
Weak password is one that has less than 8 characters
Weak password has repeated characters
Weak password has characters next to each other on a QWERTY keyboard
Weak passwords are ones that are similar to the username
Weak passwords can use personal information
All of the examples given in the question are weak passwords
Max two from:
A good example of a strong password
A good example of a different weak password
7
Six from:
I block unwanted messages/suspicious users…
…and report the sender
I never arrange to meet strangers alone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I avoid giving away personal information
I report abusive messages from a sender of the messages
I report cyber-bullying
When sending messages I always use appropriate language
If someone messages me with private and personal information about themselves I
respect their confidentiality/privacy
I always read carefully the messages before I send
I avoid sarcasm
I am not offensive when replying
I carefully check that I am replying to the correct person
I do not enable my location when messaging
11(b)
Six from:
The data will have the name/medical information attached therefore it needs protecting
The data is confidential as it links directly to the person
The data will be sensitive
To prevent blackmail/bullying from using medical results
To prevent fraud from using financial information
To prevent identity theft using contact details
To avoid the doctor’s surgery getting fined if it got made public
The doctor’s surgery’s reputation would suffer
Patients would lose trust
4(a)
Two from:
Password is too short
Easy to guess
Contains personal information
Doesn’t contain a mixture of uppercase, lowercase letters, numbers, and symbols
Contains repeated letters
4(b)
Two from:
Use drop-down lists
Use biometric passwords
Use one use tokens/OTP
Use a device instead of a password
Use on screen keyboard
13
Six from:
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the messages
When sending messages always us appropriate language
Think before you reply to a message
15(a)
Use of the Cloud
The cloud does not require a physical device
Storage size is not an issue with the cloud
Cloud is operated by a third party therefore security could be an issue
Require a stable internet to access to upload and download the data
Portable device: pen drive/Hard drive
The device uses USB port therefore it is easy to plug in
Does not require access to the internet to access the data
May be lost/damaged in transit
15(b)
Max two from:
Scrambling data
Changing plain text into cipher
Encryption converts text into a meaningless form
Max two from:
To prevent data/information from being understandable to people who access/intercept
the data
Protects data
J21-11 (1)
J21-11 (11)
J21-12 (4)
4(a) Hacking
4(b) Spyware
4(c) Smishing
9(c) Benefits
Max four:
Can reduce cyber bullying/hate speech/sexual harassment
Can reduce social media from being used for illegal activities
Can reduce the ability to incite violence/trolling
Could prevent people from being subjected to inappropriate messages
Can reduce illegal/inappropriate images
Reduce copyright breaking
Drawbacks
Freedom of speech is reduced
Would be very difficult to police as there is a massive amount of information
Different rules in different countries and social media crosses borders
Very costly to create an effective deterrent
Could force individuals to use other un-policed methods of communication
Who decides what is acceptable and what is not acceptable
J21-12 (11)
J21-13 (7)
J21-13 (9)
5 Six from:
Change default name/usernames and passwords on the router
Change the default privacy//use a strong privacy setting
Disable features not in use
Use strong WiFi encryption
Separate the IoT from the home WiFi account
Keep software/hardware up to date
Avoid public WiFi networks
Ensure firewall is operational
Use anti-spyware/up to date anti-virus
Use strong passwords
Use unique passwords for each device
Change passwords regularly
12 These are points they will need to be expanded upon to gain the mark
Six from:
Removes freedom of speech
International therefore would be difficult to police
Laws are different in each country/state
The dark net would increase
Electronic crimes would move away from the internet to other places, making
them harder to intercept
Internet users can be anonymous therefore it will be difficult to track down
Who chooses what is blocked could affect day to day browsing
Concern that everything you do is being watched therefore privacy is lost
Could be breaches in sending/receiving confidential/personal data as others
could not see it
Increase in cost of security
Reduction in speed of browsing/search
Could lead to corruption/bribery//police may use the data
No one owns the internet so it would be impossible to police effectively
Very expensive to police the internet as extra police force has to be set up
As the internet it so big it is hard to keep track on all the activity
As the internet is dynamic it would be impossible to check everything
N21-13 (10)
10 Problem:
Award a mark for each problem identified
Max four from:
If I receive requests from unwanted users/people I do not know
If I get approached from people I do not know
If I receive unwanted and abusive messages
If I wish to post images of myself on the social media site
When talking to people on social media
If someone tells me private and personal information about themselves
Strategies
Max five from:
I never arrange to meet them alone/take a chaperone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I always chat to them in the main room
I avoid giving away personal information
I block them and report them
I report the sender of the messages
I avoid publishing inappropriate images/videos