DPS INTERNATIONAL, GHANA
COMPUTER SCIENCE (0478)
Grade IX Security and Sensors Test
Name: ____________________________ Date: ___-01-22
1.The Henslows Diner is a local restaurant.
The Henslows Diner stores personal data on a computer. This computer is connected to the
Internet to allow the data to be backed up.
There is currently one security method in place to protect the data on the computer from
unauthorised access. This is a password.
Give two other security methods that could be added to improve the security of the data.
Describe how each method will keep the data safe.
Security method
1 .....................................................................................................................................
Description
....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Security method
2.....................................................................................................................................
Description
.....................................................................................................................................................
.....................................................................................................................................................
.............................................................................................................................................. [2]
2.Security of data is very important.
Three security issues are viruses, pharming and spyware. Explain what is meant by each
issue.
Viruses:
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Pharming:
................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Spyware:
..................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
.............................................................................................................................................. [6]
3. Describe three tasks carried out by a firewall.
1..................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
2...................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
3...................................................................................................................................................
.....................................................................................................................................................
............................................................................................................................................... [3]
4.Choose five correct terms from the following list to complete the spaces in the sentences
below:
Cypher text
Encryption algorithm
Encryption key
Firewall
Plain text
Proxy server
Symmetric encryption
_____________________________________________________is a security system.
It uses the same ________________________________________________ to encrypt and
decrypt a message.
Before encryption, the message is called ______________________________
The _________________________________________________ processes the original
message.
The output is known as_____________________________________ [5]
5.A company is concerned about three aspects of the security of data stored in computer
files:
Data corruption
Data loss
Illegal access to data
For each of the above, give one reason why it could occur and state one method of
prevention. Your reasons must be different in each case.
Data corruption
Reason:
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Data corruption
Prevention:
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Data loss
Reason:
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Data loss
Prevention:
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Illegal access to data
Reason:
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
Illegal access to data
Prevention:
.....................................................................................................................................................
.....................................................................................................................................................
.............................................................................................................................................. [6]
6.A company has set up an Internet website to sell their electrical goods online.
(a) Give two features you would expect to see on the website.
1...................................................................................................................................................
.....................................................................................................................................................
2...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Payments for goods can be made by credit/debit cards. Data from the cards is encrypted.
(i) What is encryption?
.....................................................................................................................................................
.....................................................................................................................................................
(ii) Why is data encrypted?
.....................................................................................................................................................
............................................................................................................................................... [2]
(c) Apart from credit card fraud, people have other fears about buying from the Internet.
Describe one of these fears.
.....................................................................................................................................................
.....................................................................................................................................................
...............................................................................................................................................[1]
7.Anna has a farm that grows fruit.
She has a system that monitors the conditions for growing the fruit.
Sensors are used in this system.
(a) Explain what is meant by the term sensor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
..............................................................................................................................................[2]
(b) State two sensors that could be used in this system and describe how they could be used.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
8. Identify three sensors that could be used in the washing machine.
State what each sensor could be used for.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Use ...........................................................................................................................................
.......................................................................................................................................... [6]
9.The processes in a chemical factory are monitored by sensors connected to a
microprocessor.
(a) Identify two different sensors used in this application. Give an example of how each
sensor could be used in the chemical factory.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
......................................................................................................................................... [4]