Mark Scheme
Mark Scheme
Mark Scheme
6) John uses the password “pandas” for his School account. Give two reasons why this is a weak
password. (2 marks)
Answer (2 marks):
o It is short and easy to guess.
o It does not include a mix of uppercase, numbers, or special characters.
8) Mathew posts photos of himself to his blog. He later decides to delete a photo from his blog.
Explain why the photo might not be removed from the internet completely. (2 marks)
Answer (2 marks):
o Copies of the photo may already exist on other websites or servers.
o Other users may have downloaded or shared the photo before it was deleted.
11) Chris has received an email claiming to be from his Bank. The email requests that she follows a
link to update her password immediately. Explain the danger of following the instructions in the
email. (2 marks)
Answer (2 marks):
o The email could be a phishing attempt to steal personal or financial information.
o The link might lead to a fake website that installs malware.
12) Suggest three pieces of advice you would give a friend to help them stay safe online. (3 marks)
Answer (3 marks):
o Use strong, unique passwords for every account.
o Avoid clicking on suspicious links or downloading unknown files.
o Keep your software and antivirus up to date.
13) Explain the terms: i) Cyberbullying ii) Trolling iii) Cybercrime (6 marks)
Cyberbullying (2 marks): Using digital platforms to harass, threaten, or intimidate someone.
Trolling (2 marks): Posting inflammatory or off-topic messages online to provoke others.
Cybercrime (2 marks): Criminal activities conducted using computers or the internet, such as
hacking or identity theft.
15) Give one way in which your web activity can be tracked? (1 mark)
Answer (1 mark): By using cookies, which store data about your browsing habits and
preferences.
Grading Scheme
Total Marks: 40
Pass Mark: 32 (80%)
9. Functions:
a) Sum: Adds a range of numbers together.
b) Max: Finds the largest value in a range. (2 marks)
Total Marks: 40