0% found this document useful (0 votes)
402 views3 pages

Igcse Ict 3ed TR Ws Answers 10

This document provides answers to questions about communication via email, the internet and its uses, and internet protocols. It includes answers about email components, spam protection, setting up email groups, inappropriate email content, internet service providers, online data storage, evaluating website reliability, secure website identification, file transfer protocol, internet risks, and secure socket layer encryption.

Uploaded by

sularekah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
402 views3 pages

Igcse Ict 3ed TR Ws Answers 10

This document provides answers to questions about communication via email, the internet and its uses, and internet protocols. It includes answers about email components, spam protection, setting up email groups, inappropriate email content, internet service providers, online data storage, evaluating website reliability, secure website identification, file transfer protocol, internet risks, and secure socket layer encryption.

Uploaded by

sularekah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CAMBRIDGE IGCSE™ ICT: WORKSHEET 10.1–10.

3 ANSWERS

10.1 Communication answers


Getting started
1 Learner correctly identifies what the parts are used for.
Typical answer could be:
a From: This shows the sender’s email address.
b To: This is where the receiver’s email address is typed.
c Cc: Carbon copy – this is where you type a receiver’s email address so they receive a copy
of the email but you do not expect them to reply.
d Bcc: Blind carbon copy – this is where you type a receiver’s email address but others won’t
know that you have copied the email to the recipient.
e Subject: This shows the subject or purpose of the email.

Practice
2 Learner correctly explains the term spam, for example, this is unsolicited email sent to a
user’s inbox.

3 Ways to protect yourself from spam:


• Use spam filters/mark email as spam/block unknown senders.
• Keep antivirus program up to date.
• Read the terms of subscriptions before agreeing to receiving email from people
or organisations.
• Secure your email credentials/password.

Challenge
4 Any two from the following:
• Easier to send email to multiple employees under a single name.
• Easy to set up meetings, ensuring everybody is invited.
• Employees can be grouped by department, age, hobbies, etc.

5 Any two from the following:


• obscene images
• violent messages/threats/racism
• illegal material
• instructions of how to make deadly weapons, e.g. bombs, poison, etc.
• profane or unfriendly language.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 1
CAMBRIDGE IGCSE™ ICT: WORKSHEET 10.1–10.3 ANSWERS

10.2 The internet and its use answers


Getting started
1 a False
b False
c True
d False

Practice
2 To provide users with access to the internet at a prescribed fee.

3 Any two from the following:


• If the internet is down, users cannot access their files.
• Internet could be slow thereby limiting the accessibility of user data.
• Potential security threats to sensitive data.
• Subscription fees could be costly if more storage space is required.

Challenge
4 a Any reasonable reason including but not limited to:
• Date is old/information is outdated.
• Information is biased/own opinion/non-factual/no evidence.
• Testimonials/reviews from visitors to the website suggest the article may not be reliable.
b Any two from the following:
• self-praise/bias
• date of last update
• URL (e.g. http or https)
• too many ads
• links to other web pages/websites.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 2
CAMBRIDGE IGCSE™ ICT: WORKSHEET 10.1–10.3 ANSWERS

10.3 The internet and internet


protocols answers
Getting started
1 a The protocol HTTPS; the padlock icon before the URL.
b Any two from the following:
• protocol (HTTPS)
• domain name (name of website e.g. https://www.cam.ac.uk)
• domain host (www)
• domain type (.ac)
• country (.uk).

Practice
2 Learner correctly explains FTP and how it is used.
Typical answer could be:
• File Transfer Protocol is a network protocol used for sending files from one computer to
another over the internet.
• Users connect to FTP in the same way that they connect to HTTP or HTTPS by specifying
FTP at the start of an address.
• In most cases, users need login details to access or download files via FTP.

3 Any two of the following and/or other meaningful explanations:


• Since the internet is not regulated, one can easily access inappropriate and
unreliable information.
• Risks of security breaches/attacks from malicious people are high.
• Requires basic knowledge of how to stay safe online.
• Can be a source of distraction for children and adults alike, e.g. online games, gambling,
ads, etc.
• Can be used as a tool for sexual exploitation.

Challenge
4 Learner creates a short presentation about Secure Socket Layer SSL and how it is used to
protect content on the internet.
Some ideas to consider:
• SSL is a security protocol.
• Provides encryption to data being sent or received.
• Can include media.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 3

You might also like