Presentation is loading. Please wait.

Presentation is loading. Please wait.

Revision Q1: Explain the term HACKING?

Similar presentations


Presentation on theme: "Revision Q1: Explain the term HACKING?"— Presentation transcript:

1 Revision Q1: Explain the term HACKING?
Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network? Q3: Describe the IMPACT of having data stolen for a business? Q4: Describe how KEY LOGGING could be used by criminals? Q5: Describe one disadvantage of the use of mobile phone TRIANGULATION

2 Revision Q6: Describe one ADVANTAGE to a business monitoring its employees? Q7: Describe two IMPACTS on employees being monitored? Q8: Describe two IMPACTS on the employees of a business if they lose data? Q9: Explain what is meant by the term ACHIVE? Q10: When using a paper data collection form, why is it preferable to collect a person’s date of birth by asking them to fill in dd/mm/yyyy rather than asking them to write it in a blank line?

3 Revision ANSWERS Q1: Explain the term HACKING?
A hacker is someone who finds the weaknesses in a computer system to gain unauthorised access. Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network? Part 3 of the CMA could be used in this case. Part 3 relates to someone illegally accessing the network with the intent to impair or with recklessness as to impairing the operation of a computer system. If the person is found then the penalty is a prison term, large fines or both.

4 Revision ANSWERS Q3: Describe the IMPACT of having data stolen for a business? The business would have to pay compensation to the owner of the data Customers would lose confidence in the business Q4: Describe how KEY LOGGING could be used by criminals? Criminals can use key logging on public computers to steal passwords and credit card information. Q5: Describe one disadvantage of the use of mobile phone TRIANGULATION It can invade the privacy of the user by tracking their location.

5 Revision Q6: Describe one ADVANTAGE to a business monitoring its employees? Audit trails can be kept It assists employees keep to the terms of the companies policies on the use of mobile devices. Q7: Describe two IMPACTS on employees being monitored? Impacts could be: Workers are able to keep on track of the work completed. Gives more productivity. Encourages some worker to work longer hours than they are contracted to do.

6 Revision Q8: Describe two IMPACTS on the employees of a business if they lose data? A formal warning can be given They could be demoted and salary reduced They could be dismissed from their jobs They face increase security which restricts them from doing the job fully Q9: Explain what is meant by the term ACHIVE? An achieve is a type of back up for a collection of data that is no longer needed for everyday business transactions. Q10: When using a paper data collection form, why is it preferable to collect a person’s date of birth by asking them to fill in dd/mm/yyyy rather than asking them to write it in a blank line? This format ensures all data entered is the same and can be validated


Download ppt "Revision Q1: Explain the term HACKING?"

Similar presentations


Ads by Google