Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Misuse

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

HAMPTON SCHOOL

INFORMATION TECHNOLOGY
COMPUTER MISUSE MONTHLY TEST
Date: ________________________________
NAME:________________________________ FORM:__________ DURATION:1 hour

Instruction: Multiple Choice -Choose the best answer to each question ( 10 marks)
1. The process of scrambling messages 4. The introduction of communication
at the sending end and unscrambling by means of means of computers has
them at the receiving end is called: REDUCED the employment
a. Coding opportunities of which of the
b. Espionage following groups of workers?
c. Encryption a. Messengers and Postal Workers
d. Eavesdropping b. Analysts and Programmers
c. Software Testers and Trainers
2. An official of Company X sells d. Web Masters and Developers
confidential information about his
company to Company Y. What is
the term used for this type of 5. The illegal copying and selling of
information misuse? programs is referred to as:
a. Identity theft a. Propaganda
b. Computer fraud b. Software piracy
c. Industrial espionage c. Computer fraud
d. Electronic eavesdropping d. Industrial espionage

3. Unauthorized, real-time interception 6. What is the main purpose of


of private communication on a propaganda on social media?
computer network is referred to as: a. Propagate good personal security
a. Propaganda b. Profile a user with the intention to
b. Identity theft steal their identity
c. Industrial espionage c. Influence persons to adopt an idea
d. Electronic eavesdropping d. Bully or embarrass a person
7. Which of the following operations is 9. Music piracy is an example of
considered a feature of a biometric computer misuse. To which category
system? of computer misuse does music
a. Matching fingerprints piracy belong?
b. Detecting irregular heartbeats a. Identity theft
c. Diagnosing medical symptoms b. Phishing attack
e. Lubricating skeletal joints c. Data theft
d. Copyright infringement
8. Which of these is NOT an element of
computer risk assessment? 10. What best describes a malicious
a. Vulnerability program on a computer system?
b. Threat a. General-purpose program
c. Decision b. A system program
d. Attack c. A virus program
d. A utility program

SHORT ANSWER QUESTION (marks)

11. (a) Define the term ‘computer vulnerability’. (2 marks)


________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

(b) Complete the table by classifying EACH of the following vulnerabilities as an

internal source or an external source. (4 marks)

Vulnerability Source

Natural disasters such as floods, hurricanes,


and earthquakes.
Employees erroneously erasing or overwriting
data
Lack of anti-virus software to scan email
attachments.
Damage to hardware and software from
electrical power surges and spikes.
(c) Computer users can be the greatest threat to a company’s computer security. State

TWO examples of strategies used to mitigate threats from users. (2 marks)

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

(d) Distinguish between the terms ‘computer security’ and ‘cybersecurity’. ( 4 marks)

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

( e) Criminals acquire credit and debit card details from unsuspecting people and use

this information to make fraudulent purchases and cash transactions.

(i) State the term used to describe the scenario above. (1 mark)

______________________________________________________________

(ii) Outline TWO appropriate methods which can be used to prevent the scenario

above. ( 2 marks)

______________________________________________________________

______________________________________________________________
12. Match the following professions with their description. (5 marks)

Professions: Network Engineer, Computer Programmer, Computer Support


Specialist, Social Media Specialist, Web Developer

ANSWER DESCRIPTION
Writes programs based on specifications, prepare
documentation and maintains existing software.
Responsible for planning and implementing social media
strategies for company’s.
Assist users who have problems with their computer
systems.
Takes a web design from a client and turns it into an
operational website.
Responsible for designing and implanting computer
networks (LAN, MAN, and WAN)

13. Question 13 is based on the items shown below as Figures 1-3.

The items shown are countermeasures used by a small business to keep its computer system. ( 2 marks)
(a) State which of the items displayed are:
(i) A physical countermeasure _____________________________________________

(ii) A software countermeasure _____________________________________________

b. Outline how EACH item may be incorporated into a strategy to minimize data theft from a
computer located in an office accessible by all employees. ( 6 marks)
______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

TOTAL MARK 38
ALL THE BEST!!!

You might also like