1.
What is a type of virus?
Correct Answer
D. Worm
Explanation
A worm is a type of virus. Unlike other viruses that require a host program to spread, worms are standalone programs that can replicate and spread on their own. They can infect computers and networks, causing damage by consuming system resources, slowing down performance, or even deleting files. Therefore, a worm is a valid answer to the question about types of viruses.
2.
Is spam a threat to an ICT system?
Correct Answer
A. True
Explanation
Spam is indeed a threat to an ICT system. Spam refers to unsolicited and unwanted messages or emails that are sent in bulk. These messages often contain malicious links or attachments that can introduce malware or viruses into the system. Spam can also consume network bandwidth and overwhelm email servers, leading to decreased performance and productivity. Additionally, spam can be used for phishing attacks, where attackers try to trick users into revealing sensitive information. Therefore, spam poses a significant threat to the security and functionality of an ICT system.
3.
Name three threats to an ICT system.
Correct Answer(s)
A. Trojans
B. Fire
D. Abuse by Staff
Explanation
The three threats to an ICT system are Trojans, Fire, and Abuse by Staff. Trojans refer to malicious software that disguises itself as legitimate software, allowing unauthorized access to the system. Fire can cause physical damage to the system and result in data loss. Abuse by Staff refers to intentional misuse or unauthorized access to the system by employees, which can lead to data breaches or system vulnerabilities.
4.
Can lighting strikes cause loss of power
Correct Answer
A. True
Explanation
Lightning strikes can indeed cause a loss of power. When a lightning bolt strikes a power line or a transformer, it can cause significant damage to the electrical infrastructure. The intense heat generated by lightning can melt or vaporize the metal components, leading to power outages. Additionally, the electrical surge from a lightning strike can overload the system and trip circuit breakers, resulting in a loss of power. Therefore, lightning strikes are a known cause of power disruptions.
5.
Where can threats come from?
Correct Answer
A. Email
Explanation
Threats can come from email because email is a common medium for cyber attacks. Malicious individuals can send phishing emails or infected attachments that can compromise the security of a computer or network. By clicking on a suspicious link or downloading a harmful file, users can unknowingly expose themselves to various threats such as malware, viruses, or identity theft. Therefore, it is important to be cautious and vigilant when dealing with emails to avoid falling victim to these threats.
6.
Which of the following would be an example of malpractice?
Correct Answer
A. When an employee goes against the company ICT code of practice e.g leaving workstation logged on
Explanation
Malpractice refers to the improper or unethical conduct by a professional or an employee. In the given options, the only example that fits this definition is when an employee goes against the company ICT code of practice by leaving their workstation logged on. This action can lead to unauthorized access to sensitive information, breaches of confidentiality, and potential security risks for the company's computer systems.
7.
Which of the following would be an example of crime in regards to ICT systems?
Correct Answer
C. When individuals or organisations break the law through using computers illegally access a computer system
Explanation
The correct answer is when individuals or organizations break the law through using computers to illegally access a computer system. This is an example of a crime in regards to ICT systems because it involves unauthorized access to a computer system, which is illegal and can result in legal consequences.
8.
Which of the following would best describe a virus?
Correct Answer
B. A piece of malicious code that is written by programmers and is used to corrupt data and systems.
Explanation
The correct answer is "A piece of malicious code that is written by programmers and is used to corrupt data and systems." This answer accurately describes a virus as a type of malicious code created by programmers with the intent to corrupt or damage data and computer systems. Viruses can spread and infect other files or systems, causing harm to the affected devices or networks.
9.
Which of the following would best describe a firewall?
Correct Answer
B. A barrier between the internet and a private computer that blocks threats such as viruses
Explanation
A firewall is a security mechanism that acts as a barrier between the internet and a private computer. Its main function is to block threats such as viruses, malware, and unauthorized access attempts from entering the private network. By monitoring incoming and outgoing network traffic, a firewall can enforce security policies and prevent malicious activities from compromising the computer's security. It is an essential component in protecting the integrity and confidentiality of data within an organization's network.
10.
Which law regulates how personal data is used and protects data subjects from the misuse of their personal data?
Correct Answer
B. Data Protection Act 1998
Explanation
The Data Protection Act 1998 is the correct answer because it is a law that regulates how personal data is used and protects data subjects from the misuse of their personal data. This act sets out principles for the collection, storage, and use of personal data by organizations and individuals. It also gives individuals certain rights regarding their personal data, such as the right to access and correct their data, and imposes obligations on organizations to handle personal data securely and responsibly.
11.
Which law prevents unauthorized access to computer systems?
Correct Answer
C. Computer Misuse Act
Explanation
The Computer Misuse Act is the correct answer because it is a law that specifically addresses and prevents unauthorized access to computer systems. This act makes it illegal to gain unauthorized access to computer systems, to interfere with computer systems, and to create or distribute malicious software. It also outlines penalties for those who commit offenses under this act, including fines and imprisonment. The Data Protection Acts and Copyright, Designs and Patents Act are not directly related to preventing unauthorized access to computer systems.
12.
Which law prevents unauthorized copying of software code?
Correct Answer
A. Copyright, Designs and Patents Act 1988
Explanation
The Copyright, Designs and Patents Act 1988 is the law that prevents unauthorized copying of software code. This act provides legal protection to the creators of original works, including software code, by granting them exclusive rights over their creations. Unauthorized copying of software code without the permission of the copyright holder is considered a violation of this law.
13.
What are examples of malpractice?
Correct Answer(s)
A. Not taking backup copies
E. Not scanning for virus
F. Accidentally deleting data
Explanation
The examples provided in the answer all relate to different forms of malpractice in the context of computer usage. Not taking backup copies can lead to data loss and potential harm to the organization or individual. Not scanning for viruses exposes the system to potential security threats and compromises the integrity of data. Accidentally deleting data can result in the permanent loss of important information. These actions demonstrate negligence and a lack of proper procedures, which can have serious consequences in terms of data security and management.
14.
Is software piracy malpractice?
Correct Answer
B. False
Explanation
Software piracy is indeed considered as malpractice. It involves the unauthorized copying, distribution, or use of software without proper licensing or permission from the copyright holder. This act not only violates intellectual property rights but also undermines the efforts and revenue of software developers and companies. It is illegal and unethical, as it deprives creators of their rightful compensation and hinders innovation and progress in the software industry. Therefore, the correct answer should be True, stating that software piracy is indeed malpractice.
15.
Is logging onto Facebook whilst a work, malpractice?
Correct Answer
A. True
Explanation
Logging onto Facebook while at work can be considered malpractice because it indicates a lack of focus and productivity. Facebook is a social media platform that can be distracting and time-consuming. Engaging in personal activities during work hours can negatively impact job performance and hinder the completion of tasks. Therefore, it is generally seen as inappropriate and unprofessional to use Facebook or any other social media platform while working.
16.
What are the examples of crime?
Correct Answer(s)
A. Fraud
B. Theft of hardware
E. Hacking
Explanation
The given examples of crime include fraud, theft of hardware, and hacking. Fraud refers to the act of deceiving someone for personal gain, such as identity theft or financial scams. Theft of hardware involves stealing physical objects like computers or electronic devices. Hacking refers to unauthorized access to computer systems or networks. These examples illustrate different types of criminal activities that can cause harm, financial loss, or breach of privacy and security.