Chapter 6 SB Answers
Chapter 6 SB Answers
Chapter 6 SB Answers
b Cookies
small files which are stored on a user’s computer
sent to a computer when the user visits a website
allow the website to know a user’s preferences and can make suggestions based on a user’s
previous searches
each time the user visits the website, they will be recognised and the user’s information
will be retrieved from a database making it much faster and easier to access the website
(e.g. baskets, user names, and so on).
c i) session cookies
used when buying online, for example
keep a user’s items in a ‘shopping basket’
cease to exist on a user’s computer when the web browser is closed or the website
session is terminated.
ii) permanent cookies
these cookies remember user login details (such as passwords)
remain in operation on the user’s computer even after the web browser is closed or the
website session is terminated
advantage is they remove the need to type in personal details every time a certain
website is visited
many countries have introduced laws to protect users and these cookies are supposed
to become deactivated after 6 months of inactivity.
iii) third party cookies
these cookies are created by a ‘third party’ to carry out market research into a user’s
buying habits and surfing habits
the user can delete or block such cookies by configuring their web browser
the disadvantage of blocking such cookies is that the website will no longer recognise
a user’s preferences.
5 It is possible to corrupt a memory stick if the correct withdrawal procedures are not followed.
Activity 6A
1 a, b, c three examples have been chosen … other answers are possible:
Phishing (risk to the security of stored data)
With phishing, the creator sends out legitimate-looking emails to target users …
… as soon as the recipient clicks on a link in the email or attachment …
… they are sent to a fake website or they are fooled into giving personal data in
response to the email.
The email often appears to come from a trusted source such as a bank or well-
known service provider.
The key aspect is that the recipient has to carry out a task (e.g. click on a link)
before the phishing scam can cause any harm.
The creator of the email can gain personal data such as bank account data or
credit card numbers from the user which can lead to fraud or identity theft.
They need an active host program on the ta.rget computer or an operating system
that has already been infected before they can run.
Running antivirus software in the background on a computer will constantly
check for virus attacks.
All antivirus software have the following common features:
They check software or files before they are run or loaded on a computer.
Antivirus software compares a possible virus against a database of known
viruses.
They carry out heuristic checking.
Any possible files or programs which are infected are put into quarantine which
…
… allows the virus to be automatically deleted or …
… allows the user to make the decision about deletion.
Antivirus software needs to be kept up to date since new viruses are constantly
being discovered.
Full system checks need to be carried out once a week, for example, since some
viruses lie dormant and would only be picked up by this full system scan.
2 Worms – this is a type of stand-alone virus that can replicate itself with the intention of spreading
to other computers; often uses networks to search out computers with weak security which are
prone to such attacks.
Logic bombs – these are code embedded in a program on a computer; when certain conditions are
met (For example, Friday 13th) they are automatically activated to carry out tasks such as deleting
files or start sending data to a hacker.
Trojan horses – these are malicious programs often disguised as legitimate software; they replace
all or part of the legitimate software with the intent of carrying out some harm to the user’s
computer system.
3 a first password is his date of birth
second password contains name of his pet dog
third password contains his name
b strong passwords should
contain upper case letters
contain lower case letters
contain numerical characters
contain other keyboard characters
contain at least 8 characters in length
not contain easy to guess words or numbers
be changed on a regular basis but not in sequence e.g. if existing password is AXtuLr0045
then the next one should not be AXtuLr0046 etc.
c
If the device John is using can be accessed by other people, it isn’t safe to store the
password on the device.
If it is saved on the shared device, the password is accessible to hackers etc.
d John should be suspicious because
the link may not be to a genuine website
by supplying details, the user may be inadvertently giving away personal details to a third
party
it is very likely to be a phishing scam.
Activity 6B
1 error at intersection of bit 6 and byte 4:
(bit 6 has even parity and byte 4 has even parity)
2 a Name: character check, presence check
Date of birth: range check, character check, presence check, format check
Tel No: character check, presence check, length check, format check (0……)
Title/Sex: consistency check
b Validation checks – if the input data matches a set of rules/meets a given criteria.
Verification checks – checks to make sure that the input data matches the original data by
double data entry and/or visual check.
Both methods needed since original data may not be correct.
For example 1, year of birth 1840 rather than 1940; a verification check would not pick this
up since the input data would match the original data and only a validation check would
show this data to be in error.
For example 2, data of birth input as 11/04/2004 when it should be 04/11/2004 would not
be picked up by validation checks (matches format, character check. length checks) but it
would be picked up by a verification check since it didn’t match the original data.
3 a
Verification could use double data entry when the data is entered twice by the same
person/different operators; the computer compares both sets of input.
Alternatively, as data is input the user checks the entries against the original to check for
mis-matches.
b Code NXXXXXNN – length check e.g. A516412KK would fail the check (it would also be
equally possible to do character checks on each field or carry out a format check to ensure it
matches NXXXXXNN or carry out a uniqueness check since each product should have a
unique code).
Number in stock – range field e.g. 125 would fail the check (it would also be equally possible
to do a character check to ensure only numeric values input or a length check to ensure
number of digits didn’t exceed 3 but this wouldn’t be enough on its own since it could still
exceed 100 and pass the check).
Cambridge International AS & A Level Computer Science 5
© Helen Williams and David Watson 2020
Cambridge International AS & A Level Computer Science Answers
Unit cost – range check e.g. (assuming max price of an item is $1000.00) –$450 would fail the
test because it is negative or $1500.00 would also fail because it is > $1000.00 (it would also
be equally possible to do a character check to ensure only numerical values are input).
Telephone number – length check e.g. 012345678901112 would fail the check (it would also
be equally possible to do a character check since all characters entered must be numerical or it
would be possible to do a format check since the telephone number must fit the format
0XXXXXXXXXX; NOTE: a range check would not work here since the telephone number
begins with a zero).
Note: in all cases a presence check could be acceptable if the data is being input to an online
form where all fields require an entry
Extension Activity 6A
Levels of access controlled by use of different passwords
Extension Activity 6B
a weak – could be a birthday which would be relatively easy to guess
b fairly weak – this is a very common password to use
c strong – mix of numbers, upper and lower case letters, use of other characters
d strong – mix of numbers, upper and lower case letters, use of other characters
e weak – easy to guess the number sequence of 1 2 3 4 5
Extension Activity 6D
1 ISBN-13:
take first 12 digits
multiply each in turn (left to right) by 1, 3, 1, 3, …… 1, 3
add all 12 totals and carry out modulo-10 division
subtract remainder from 10 to give check digit
example: 9 7 8 0 3 4 0 9 8 3 8 2
×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3
= 9 + 21 + 8 + 0 + 3 + 12 + 0 + 27 + 8 + 9 + 8 + 6
= 111 ൊ 10 = 11 remainder 1
check digit = 10 − 1 = 9
2 a modulo-11
2 1 3 1 1 1 0 0 0 4 2 8
×13 ×12 ×11 ×10 ×9 ×8 ×7 ×6 ×5 ×4 ×3 ×2
= 26 + 12 + 33 + 10 + 9 + 8 + 0 + 0 + 0 + 16 + 6 + 16
= 136 ൊ 11 = 12 remainder 4
check digit = 11 − 4 = 7
ISBN-13
2 1 3 1 1 1 0 0 0 4 2 8
×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3
= 2 + 3 + 3 + 3 + 1 + 3 + 0 + 0 + 0 + 12 + 2 + 24
= 53 ൊ 10 = 5 remainder 3
check digit = 10 − 3 = 7
b modulo-11
9 0 9 8 1 2 1 2 3 5 4 4
×13 ×12 ×11 ×10 ×9 ×8 ×7 ×6 ×5 ×4 ×3 ×2
= 117 + 0 + 99 + 80 + 9 + 16 + 7 + 12 + 15 + 20 + 12 + 8
= 395 ൊ 11 = 35 remainder 10
check digit = 11 − 10 = 1
ISBN-13
9 0 9 8 1 2 1 2 3 5 4 4
×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3 ×1 ×3
= 9 + 0 + 9 + 24 + 1 + 6 + 1 + 6 + 3 + 15 + 4 + 12
= 90 ൊ 10 = 9 remainder 0
check digit = 10 − 0 = X
Extension Activity 6E
1 1
2 0
3 1
4 1
5 0
Extension Activity 6F
1 a
b
c
d
e
2 No it isn’t possible
They need an active host program on the target computer or an operating system that has
already been infected before they can run.
Running antivirus software in the background on a computer will constantly check for
virus attacks.
All antivirus software have the following common features:
They check software or files before they are run or loaded on a computer.
Antivirus software compares a possible virus against a database of known viruses.
They carry out heuristic checking.
Any possible files or programs which are infected are put into quarantine which …
… allows the virus to be automatically deleted or …
… allows the user to make the decision about deletion.
Antivirus software needs to be kept up to date since new viruses are constantly being
discovered.
Full system checks need to be carried out once a week, for example, since some viruses
lie dormant and would only be picked up by this full system scan .
b
A firewall can be either software or hardware.
It sits between the user’s computer and an external network …
… and filters information in and out of the computer.
This allows the user to decide to allow communication with an external source …
… and it also warns a user that an external source is trying to access their computer.
Firewalls are the primary defence to any computer system to help protect it from hacking,
malware, phishing and pharming.
The main tasks carried out by a firewall include:
Examine the ‘traffic’ between user’s computer (or internal network) and a public
network.
Check whether incoming or outgoing data meets a given set of criteria …
… if the data fails the criteria, the firewall will block the ‘traffic’ and give the user a
warning that there may be a security issue.
The firewall can be used to log all incoming and outgoing ‘traffic’ to allow later
interrogation by the user.
Criteria can be set so that the firewall prevents access to certain undesirable sites …
… the firewall can keep a list of all undesirable IP addresses.
It is possible for firewalls to help prevent viruses or hackers entering the user’s
computer.
The firewall can be a hardware interface which is located somewhere between the
computer and the internet connection.
It is often referred to in this case as a gateway …
… alternatively the firewall can be software installed on a computer and …
… in some cases this is part of the operating system.
3 At the intersection of bit 6 and byte 5 – the bit in this position is incorrect.
(bit 6 is even parity; byte 5 is even parity)
corrected byte: 1 1 1 0 1 0 1 0
Cambridge International AS & A Level Computer Science 8
© Helen Williams and David Watson 2020