Davina Pruitt-Mentle Educational Technology Policy, Research and Outreach University of Maryland
Exam Questions – Davina Shah
description
Transcript of Exam Questions – Davina Shah
![Page 1: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/1.jpg)
Exam Questions – Davina Shah
![Page 2: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/2.jpg)
Jan 11
Encryption and Hacking
![Page 3: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/3.jpg)
Your Answer
• When the data is encrypted, all the information is scrabbled up so that if the data is stolen it can not be understood by anyone. This means that data is safe as unauthorised users will not be able to read the data.
![Page 4: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/4.jpg)
Your Answer
encrypted
unreadable
decryption
Passwords
secret guess
Firewalls
recognised
![Page 5: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/5.jpg)
June 11 Q5
User IDs and passwords
![Page 6: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/6.jpg)
Your Answer
• A username is needed so that others do not have the same ID and you can tell people apart.
• The purpose of a password is that others cannot access data or files that are private and a password protects your account from everyone else.
![Page 7: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/7.jpg)
Your Answer
![Page 8: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/8.jpg)
Malware
![Page 9: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/9.jpg)
Your Answer• Malicious software is the term used to describe any computer
program that enters a computer system without the owner or user’s consent and does them or their computer system harm, examples would include: viruses, worms – copy themselves and use networks to spread around without any user to perform tasks, spyware – collects information about users without their knowledge or consent, adware – software is automatically downloaded and installed on a computer system and Trojan horse – a software application that seems to the user to perform a useful task or job.
• Schools can make sure that students do not look at websites that show inappropriate materials as these often carry viruses and malicious software.
• Schools can also make sure that students do not download software, e.g. files or programs, from websites that are not genuine, e.g. make sure students do not download illegal music, video files or other software.
![Page 10: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/10.jpg)
Data Security
![Page 11: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/11.jpg)
![Page 12: Exam Questions – Davina Shah](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816189550346895dd12542/html5/thumbnails/12.jpg)
Your AnswerShe should:• Do not give out any personal information, e.g. your address
and phone numbers.• Make sure that nobody has access to her password to enter
the chat room, and make sure that she does not share her password with others.
• She shouldn’t open any files that are attached in the chat room as they may contain a virus, and she shouldn’t open any hyperlinks that are sent in case they also contain viruses.
• Make sure that the person she is talking to is actually a student and has not stolen a students identity.