0% found this document useful (0 votes)
17 views4 pages

Chapter 5 IGCSE COMP SCI

1) Cookies are small files stored on a user's computer by websites to track user habits. Session cookies expire when the browser closes, while persistent cookies are stored longer. Cookies are used for tracking, preventing frequent logins, and displaying relevant ads. 2) Blockchains prevent tampering by linking each new block of transactions to the hash of the previous block. This causes all nodes to reject altered chains that don't match what they already have. 3) Digital currencies exist digitally over computer networks without central authorities like banks. They work as exchange mediums through decentralized networks not reliant on third parties.

Uploaded by

igcse8230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

Chapter 5 IGCSE COMP SCI

1) Cookies are small files stored on a user's computer by websites to track user habits. Session cookies expire when the browser closes, while persistent cookies are stored longer. Cookies are used for tracking, preventing frequent logins, and displaying relevant ads. 2) Blockchains prevent tampering by linking each new block of transactions to the hash of the previous block. This causes all nodes to reject altered chains that don't match what they already have. 3) Digital currencies exist digitally over computer networks without central authorities like banks. They work as exchange mediums through decentralized networks not reliant on third parties.

Uploaded by

igcse8230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Act 5.

2) a) Session cookies expire when the website is closed. Session cookies are stored on the server.
Cookies that are stored for longer periods are persistent cookies. Persistent cookies are stored locally.

b) To track user’s habits. To prevent users from logging in frequently. To display relevant searches
and ads to users.

4) Persistent cookies are tracking cookies because they track your online activites and are stored for
long. Ex: Facebook collects data and displays ads based on the information. Google uses search
history to display relevant searches and ads.

Act 5.2

1 b) Each block has a block header, which contains a reference to the previous block's
hash. Since a block's hash is calculated by hashing everything in the block including the
header, each block after would have a different hash because their block header would
be different.

This would cause all nodes on the network to reject the chain because it doesn't match
the chain they already have.

2) Digital currency — which may also be called digital money — is considered a form of
currency stored and exchanged over a computer network, which means it can exist
digitally. A cryptocurrency, or crypto[a] is a digital currency designed to work as a
medium of exchange through a computer network that is not reliant on any central
authority, such as a government or bank, to uphold or maintain it.

Act 5.3
1) a) Data interception – Data is intercepted while it is being transferred.
Hacking – The data can be hacked.
DDos attacks – Can temporarily stop the server due to large volume of
requests.

b) Data interception – Data can be intercepted while it is being transferred.


Hacking – The data can be hacked.
DDos attacks – Can temporarily stop the server due to large volume of
requests.

c) Data interception – Use encryption such that data cannot be used even if
found.
Hacking – Install antivirus software.
DDos attacks – Write a piece of code that stops more than one request from
that particular IP address.

2) Worm – A worm is a standalone malware computer program that replicates itself


in order to spread to other computers.
Ransomware - Ransomware is a type of malware that threatens to publish the
victim's personal data or permanently block access to it unless a ransom is paid.

Trojan Horse - A Trojan horse is any malware that misleads users of its true intent by
disguising itself as a standard program.

3) a) Too easy to crack with prior information about him and brute force attacks.

b) Use special characters and passwords that don’t relate to him. Use suggested
passwords.

c) Because when a malware is installed on your computer, it can access your saved
passwords.

Act 5.4

1) a) Weak, cause it can be related to someone’s birth date.


b) Weak, cause it doesn’t have a special character.
c) Strong, cause it has one capital letter, numerical value and a keyboard character.
d) Strong, cause it has one capital letter, numerical value and a keyboard character.
e) Weak, cause it doesn’t have a special character.

2) a) Authentication. Based on your credential, you have access levels. These


access levels can only be used by someone from the airport and not a
passenger.

b) Install anti-virus software on a file server. Connect all the computers to this
file server and it automatically installs the software for the computers.

Act 5.5

1) a) The system will be less accurate since it can be affected by changes in


lighting, and change in person’s face.

b) Voice recognition and fingerprint.

2) Benefits: It is easier to give these commands than click on buttons while


driving. Drawbacks: Voice recognition can be manipulated by recorded
audio of the person.

Act 5.6

2) SSL certificate is a form of digital certificate that ensures data exchange is


secure.

3) a) Check spellings in the mail and in links. Check tone used in email
message, if inappropriate or incorrect, it could be a phishing email.
b) The sender address, the language and the link.

Exam Style Questions

1) a) i) Cookies are small files or code stored on a user’s computer. Session


cookies expire when the website is closed.
ii) Session cookies are stored on the server. Cookies that are stored for
longer periods are persistent cookies. Persistent cookies are stored
locally.
iii) To track user’s habits. To prevent users from logging in frequently. To
display relevant searches and ads to users.
2) a) Spyware is software that tracks user’s activities. It runs in the background and
monitors the user’s activities and sends the data back to the criminal.
b) Two-step verification.
c) Filtering data in network traffic.
d) Installing firewall and the usage of authentication.

4) b) Each person is different and has different ridges and grooves present on their
finger. This ridges and grooves are identified by the system. This prevents the
corruption of attendance.
5) a) Instant messaging: Malicious links are embedded into messages. Scareware: When
there is a pop up with infected virus which claims to be a solution to the virus.
Emails: The user thinks the email is genuine but when they click on a link it redirects
them to a malicious website. Phone calls: A scammer pretends to be an IT
professional and the user is advised to download malicious software to solve their
problem.

b) Stage 1 – Victims are identified; information about victim gathered and method of
attack decided.
Stage 2 – At this stage the victim is being targeted.
Stage 3 – The attack is executed allowing user to obtain information or cause
disruption.
Stage 4 – Once they have got what they needed, they try to remove all traces to
cover their tracks.

c) i) It is digital and can be decentralized.


ii) Blockchain technology enables decentralization through the participation of
members across a distributed network. There is no single point of failure and a single
user cannot change the record of transactions. It's based on principles of
cryptography, decentralization and consensus, which ensure trust in transactions. In
most blockchains or distributed ledger technologies (DLT), the data is structured into
blocks and each block contains a transaction or bundle of transactions. Each new
block connects to all the blocks before it in a cryptographic chain in such a way that
it's nearly impossible to tamper with.
6) a) HTML structure is a defined set of elements in the language that is used to
structure content and design web pages.
7) a) SSL is a protocol that ensures that data is sent securely over the internet. The web
server sends an SSL certificate. It is used to authenticate a website and data
exchange between browser and website making it secure.

You might also like