Test 2
Test 2
Test 2
INFORMATION TECHNOLOGY
COMPUTER MISUSE MONTHLY TEST
Date: ________________________________
NAME:________________________________ FORM:__________ DURATION:1 hour
Instruction: Multiple Choice -Choose the best answer to each question ( 10 marks)
1. The process of scrambling messages at the sending end and unscrambling them at the
receiving end is called:
a. Coding
b. Espionage
c. Encryption
d. Eavesdropping
3. There are many software restrictions used by computers to protect data and maintain data
integrity. Which of the following entities are software restriction media?
I. Viruses
II. Passwords
III. Encryptions
a. I and II only
b. I and III only
c. II and III only
d. I, II, and III
10. There are many software restrictions used by computers to protect data and maintain data
integrity. Which of the following entities are software restriction media?
a. Viruses and passwords
b. Viruses and encryption
c. Password and encryption
d. Viruses, passwords, and encryption
________________________________________________________________________
________________________________________________________________________
(b) Complete the table by classifying EACH of the following vulnerabilities as internal
Vulnerability Source
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
(d) Distinguish between the terms ‘computer security’ and ‘cybersecurity’. ( 4 marks)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
( e) Criminals acquire credit and debit card details from unsuspecting people and use
(i) State the term used to describe the scenario above. (1 mark)
______________________________________________________________
(ii) Outline TWO appropriate methods which can be used to prevent the scenario
above. ( 2 marks)
______________________________________________________________
______________________________________________________________
ANSWER DESCRIPTION
Writes programs based on specifications, prepare documentation and maintains
existing software
Responsible for planning and implementing social media strategies for company’s
Assist users who have problems with their computer systems
Takes a web design from a client and turns it into an operational website
Responsible for designing and implanting computer networks (LAN, MAN, and
WAN)
13. Question 13 is based on the items shown below as Figures 1-3.
The items shown are countermeasures used by a small business to keep its computer system. ( 2 marks)
(a) State which of the items displayed are:
b. Outline how EACH item may be incorporated into a strategy to minimize data theft from a
computer located in an office accessible by all employees. ( 6 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
TOTAL MARK 38
ALL THE BEST!!!