Chapter 5 IGCSE COMP SCI
Chapter 5 IGCSE COMP SCI
2) a) Session cookies expire when the website is closed. Session cookies are stored on the server.
Cookies that are stored for longer periods are persistent cookies. Persistent cookies are stored locally.
b) To track user’s habits. To prevent users from logging in frequently. To display relevant searches
and ads to users.
4) Persistent cookies are tracking cookies because they track your online activites and are stored for
long. Ex: Facebook collects data and displays ads based on the information. Google uses search
history to display relevant searches and ads.
Act 5.2
1 b) Each block has a block header, which contains a reference to the previous block's
hash. Since a block's hash is calculated by hashing everything in the block including the
header, each block after would have a different hash because their block header would
be different.
This would cause all nodes on the network to reject the chain because it doesn't match
the chain they already have.
2) Digital currency — which may also be called digital money — is considered a form of
currency stored and exchanged over a computer network, which means it can exist
digitally. A cryptocurrency, or crypto[a] is a digital currency designed to work as a
medium of exchange through a computer network that is not reliant on any central
authority, such as a government or bank, to uphold or maintain it.
Act 5.3
1) a) Data interception – Data is intercepted while it is being transferred.
Hacking – The data can be hacked.
DDos attacks – Can temporarily stop the server due to large volume of
requests.
c) Data interception – Use encryption such that data cannot be used even if
found.
Hacking – Install antivirus software.
DDos attacks – Write a piece of code that stops more than one request from
that particular IP address.
Trojan Horse - A Trojan horse is any malware that misleads users of its true intent by
disguising itself as a standard program.
3) a) Too easy to crack with prior information about him and brute force attacks.
b) Use special characters and passwords that don’t relate to him. Use suggested
passwords.
c) Because when a malware is installed on your computer, it can access your saved
passwords.
Act 5.4
b) Install anti-virus software on a file server. Connect all the computers to this
file server and it automatically installs the software for the computers.
Act 5.5
Act 5.6
3) a) Check spellings in the mail and in links. Check tone used in email
message, if inappropriate or incorrect, it could be a phishing email.
b) The sender address, the language and the link.
4) b) Each person is different and has different ridges and grooves present on their
finger. This ridges and grooves are identified by the system. This prevents the
corruption of attendance.
5) a) Instant messaging: Malicious links are embedded into messages. Scareware: When
there is a pop up with infected virus which claims to be a solution to the virus.
Emails: The user thinks the email is genuine but when they click on a link it redirects
them to a malicious website. Phone calls: A scammer pretends to be an IT
professional and the user is advised to download malicious software to solve their
problem.
b) Stage 1 – Victims are identified; information about victim gathered and method of
attack decided.
Stage 2 – At this stage the victim is being targeted.
Stage 3 – The attack is executed allowing user to obtain information or cause
disruption.
Stage 4 – Once they have got what they needed, they try to remove all traces to
cover their tracks.