Answers For Data Security, Data Integrity, Back-Ups and Archives

These are notes made by my ICT teacher. GOD BLESS HER! i hope these help

HideShow resource information
  • Created by: mar-rii
  • Created on: 07-06-09 19:22
Preview of Answers For Data Security, Data Integrity, Back-Ups and Archives

First 552 words of the document:

Data security, data integrity, backups & archiving
Here are some related past paper questions to try:
1) A computer user enters data into a database. The user has to enter a four-figure serial number e.g. 1234.
a) Give one method used to verify the serial number. [1]
One answer from:
Double entry
Visual verification/proof-read/manual/double-check.
b) Why is the data verified? [1]
To check that the data has been entered accurately.
(Note there is no mark for saying "To check it is accurate" because the user might have been told the wrong serial
number in the first place, all the user can verify is that what they enter matches what they were told to enter.)
c) Give two methods that could be used to validate the serial number. [2]
Two answers from:
Range check OR checking it is between 2 values e.g. between 1000 and 9999
Checking it is data type number/integer
Length check - checking it contains four characters.
Presence check - checking something has been entered, checking the field isn't empty
Use a check digit.
d) Why is the data validated? [1]
To check that the data is reasonable. (No mark for writing "to check it is accurate/correct").
2) a) Suggest two rules for choosing or using a password. [2]
Two answers from:
Never write it down
Never tell it to anyone/keep it secret
Never type it in when people are watching.
Do not choose words associated with you.
Do not include dictionary words.
Change it regularly.
Choose a password consisting of letters (upper & lower case) and numbers
Make it at least 7 characters long
Make sure it is memorable so you won't forget it
b) When a user changes a password it is usually typed in twice. Why? [1]
To verify what they typed first time is correct.
3) Describe two ways of preventing unauthorised access to work saved on a LAN. [2]
Two answers from:
Encrypting files.
Setting passwords to the whole LAN, to particular drives/areas of the LAN, to particular folders on the LAN, to
particular files on the LAN.
Setting up User IDs
Only allowing access particular drives to particular users
4) Users of a school network are required to enter a user name and a password into a log on window.
a) What is the purpose of the user name? [1]
To identify the user to the system.
b) What is the purpose of the password? [1]
Security/to only allow access to that user.
5) Describe two ways of reducing the risk of a computer virus infecting a computer. [2]
Two answers from:
Do not allow the use of external storage devices such as CDs, DVDs, USB memory sticks.
Do not connect to the Internet.
Do not download from the Internet.
Scan all files/folders using anti-virus software before opening files/folders on external storage devices such as
CDs, DVDs, USB memory sticks.
Keep the anti-virus software up-to-date.
Do not install software from suspicious sources.
Do not open dubious emails or email attachments

Other pages in this set

Page 2

Preview of page 2

Here's a taster:

Restrict access to only those users who use anti-virus software
Do not connect the computer to a network OR use the computer as a stand-alone computer.
Keep software updated by regularly downloading patches/updates from software manufacturers' websites.
6) A doctor holds confidential data on a network. State three different ways of reducing the risk of unauthorised
access to this data by other users. [3]
Three answers from:
By using User Ids/Passwords for access to the network.
By logging off every time he leaves the computer.…read more

Page 3

Preview of page 3

Here's a taster:

Get 3 marks for: Making 1 valid point with 2 examples/expansions
Get 3 marks for: Making 3 valid points
Get 4 marks for: Making 2 valid points with 2 examples/expansions
Get 4 marks for: Making 1 valid point with 3 examples/expansions
Get 4 marks for: Making 3 valid points with 1 example/expansion
Get 5 marks for: Making 3 valid points with 2 examples/expansions
Get 5 marks for: Making 2 valid points with 3 examples/expansions
Get 6 marks for: Making 3 valid points with 3 examples/expansions…read more

Page 4

Preview of page 4

Here's a taster:

Barry gets in trouble for it
Denise might log into Barry's area & delete his work so he has to do it again
change his work so that it is no longer correct
copy his work then pretend it is her own (plagiarism) & Barry
might get in trouble for having the same work as others
copy his work & give a copy to others (theft) & Barry might
get in trouble for having the same work as others
change Barry's password so he can't…read more

Page 5

Preview of page 5

Here's a taster:

It is a program/piece of software.
It deletes data and/or damages/corrupts data and/or alters data and/or causes computer to crash. (Remember,
viruses do NOT damage hardware, they damage/corrupt programs & files)
A virus copies/replicates itself, sends copies of itself to other computers.
b) Barbara has some important files on her computer. Describe what she should do to avoid losing her work [2]
Two answers from:
Keep/regularly make a backup copy.
Store the backup on removable media, e.g.…read more

Page 6

Preview of page 6

Here's a taster:

A cinema is to use a computer booking system. Part of the system will accept bookings for up to 6 seats. A table
of test data is drawn up to test this part of the system. Complete the table below. The first test has been done
for you.…read more

Page 7

Preview of page 7

Here's a taster:

It is easier to compare the prices available at different online shops than it is to compare the prices available at
different real shops as the online shop prices can all be compared sitting at your computer whereas to compare the
real shop prices you have to walk round lots of shops.…read more

Page 8

Preview of page 8

Here's a taster:

Floppy disks · re-usable · small capacity
· slow to access
· easily lost
· easily damaged
· some computers have no floppy drive
If you say an advantage is that the storage medium is cheap to buy you will only get the mark if you compare it to
another storage medium, i.e. say what it is cheaper than.
Marks to be awarded as follows:
A maximum of 4 marks if only one storage medium is discussed.…read more

Page 9

Preview of page 9

Here's a taster:

What is meant by the term extreme data? [1]
One answer from:
Data at the end/edge of the allowable range
The lowest allowable number
The highest allowable number
c) People using a library can borrow up to six books at a time. The library needs to test its new database for
recording book details. Tick one box in each row to describe the type of data used. The first one has been done
for you.…read more

Page 10

Preview of page 10

Here's a taster:

Get 3 marks for: Making 3 valid points
Get 4 marks for: Making 2 valid points with 2 examples/expansions
Get 4 marks for: Making 1 valid point with 3 examples/expansions
Get 4 marks for: Making 3 valid points with 1 example/expansion
Get 5 marks for: Making 3 valid points with 2 examples/expansions
Get 5 marks for: Making 2 valid points with 3 examples/expansions
Get 6 marks for: Making 3 valid points with 3 examples/expansions
Points & expansions from:
Point Expansion
Everyone always log off correctly…read more

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all resources »