CIE ICT Complete Answers Ch4
CIE ICT Complete Answers Ch4
1 a Three from:
• video camera/webcam
• microphone
• keyboard
• large screen/monitor/data projector
• speakers/headphones.
b A web conference:
• is held over the internet using TCP/IP connection/in real time, for example,
webinar/webcasts/VoIP
• can be point to point (VoIP) or multicast (i.e. source data is sent from one computer to
many different receiving computers)
• allows text communication
• allows video communication
• uses web browsers.
c • data packets are sent from the computer in network ‘A’ to the nearest router
• the router checks IP address and notes the data packets that aren’t intended for any
devices on network ‘A’
• data packets are forwarded to other routers in network
• data packets are forwarded to the router linked to network ‘B’ using its IP address
• the router recognises the IP addresses of data packets referred to network ‘B’
• data packets are forwarded to the destination computer on network ‘B’.
4 a Zero login:
• allows users to log into a computer system without the need to type in a password
• relies on biometrics …
• … and on behavioural patterns …
• biometrics: fingerprints, facial recognition
• behavioural: typing speed, location, how the user swipes the screen
• the systems use the above information to build up complex user profiles.
b Physical token:
• a type of hardware security device
• form of authentication …
• … to prove user has possession of the token
• when the PIN is entered into token, a one-time password (OTP) is created and shown
on screen
• the code changes every 30 sec or so
• the OTP is typed into another device as part of a security authentication process
• can be connected or disconnected (for example, through USB).
c Electronic token:
• software installed on user's device as an app
• used to authenticate a user
• the user opens the app on a device which generates random numbers (OTP) …
• … which is valid for a limited amount of time
• the user enters the OTP onto the website using this type of authentication; often
includes a PIN, touch ID or face ID in addition
• the website server runs the same app
• both the user and the website use synchronised clocks and therefore generate the
same OTP.
All data packets are sent to all the devices on the network
6 a Virus – a program which replicates; the intention is to delete, corrupt or alter files/data to
prevent normal running of a computer.
b Three from:
• checks software or files before they are run or loaded onto a computer
• compares a potential virus against database of known viruses
• carries out heuristic checking (checking on behaviour of a program/file that could
indicate it is a virus)
• puts infected files or programs into quarantine
• automatically deletes the virus or allows the user to make the decision
• runs in the background
9 a Cloud computing:
• computing resources that can be accessed on separate and remote servers
• cloud computing can refer to storage or applications
• may be hundreds of servers in several locations
• the same data is stored on more than one database in case of maintenance and/or repair
(data redundancy)
• three types of cloud storage: public, private, hybrid.
b Three from:
• files can be accessed at any time, in any location, on any device
• there is no need to carry external storage with you; not even necessary to take a
computer containing files with you
• the cloud provides users with remote, automatic back-up
• the cloud allows recovery of data if the customer’s hard drive fails on their
own computer
• it offers unlimited storage capacity.
c Three from:
• it is not always secure
• if there is a poor internet connection, or none, the cloud cannot be used
• it can be expensive if large amounts of storage needed
• the potential failure of cloud storage companies is always possible; poses risk of losing
all back-up data.
10 a "A" = hub
b "B" = hub/switch, "C" = hub/switch, "D" = bridge
c "E" = hub/switch, "F" = router