Download imp questions

To download the file click here

Capabilities of ICT devices


What things do ICT devices do well?
ICT devices and systems are capable of performing lots of tasks very well. Some of these are listed below:

  1. Speed Computers perform tasks very fast. Some cpu's can execute literally 'billions' of instructions per second.
  2. Accuracy If programmed properly, computers are capable of performing the same tasks 100% accurately every time.
  3. Multi-Tasking Computers are able to perform many tasks at the same time.
  4. Repetitive Tasks Computers will carry out boring and repetitive tasks accurately. Humans tend to get bored and make mistakes.
  5. Networking Computers can be joined together (either as a LAN or a WAN) and allows them to easily share resources such as printers and data.
  6. Huge amounts of Data Storage Computer databases can store enormous amounts of data. All types of data be stored including text, numbers, images and video.
  7. Fast Searches Computers can search for stored data extremely fast. For example, the police can match fingerprints in a database in minutes rather than spending weeks searching through printed copies.
  8. Security Data can be secured with passwords or encryption.

What things do ICT devices not do well?

Computers, and other devices, are not without their problems. Limitations of ICT devices are listed below:


  1. Battery Life Portable device such as laptops, PDAs and mobile phones are limited by their battery life. These devices only remain charged for so long before they need to be plugged into the mains.
  2. Weight Some portable devices are heavy (especially laptops). This does not make them ideal for carrying around.
  3. Screen and Keyboard Size Smaller devices such as mobile phones and PDAs have very small screens and keyboards which can cause problems for some people.
  4. Bandwidth is the speed that data can be transported over the Internet. Low bandwidth means that large files will take a long time to transfer.

How do hackers and fraudsters try to steal our data?

How do hackers and fraudsters tryto steal our data?
Phishing
1.      'Phishing' is used to describe methods that thieves use to 'fish' for our data. This is where fraudsters try and trick us into giving up our bank details, credit card details, usernames and passwords.
2.      Phishing is usually carried out over emails pretending to be from legitimate organizations like banks and building societies.
3.      The emails usually say that there is a problem with your account and then they ask you to provide your usernames, passwords or account numbers so that the problem can be rectified.

Ways to reduce the risk of getting 'phished'

1.      Never ever give your bank details or passwords out over email. Banks NEVER ask their customers for this information.
2.      Some phishing scams promise you enormous wealth "If you pay a small administration fee". If something sounds too good to be true then it probably is and you would be best off ignoring the mail.
3.      Report any phishing attempts to your email account provider.
4.      Don't respond to emails from people you do not know.

Pharming

  1. The intention of pharming is the same as phishing..... to obtain personal information such as usernames, passwords and bank details etc. Pharming usually targets users of online banking or shopping websites.
  2. The way this is done however is slightly different. 'Pharmers' infect legitimate websites with malicious code that will 'redirect' you to their bogus version of the website.
  3. The bogus website will look very similar, or even identical, as the legitimate website. This makes pharming very dangerous and difficult to detect.

Ways to reduce the risk of getting 'pharmed'

  1. Check the url (web address) of the website before you enter personal information. The bogus website will usually have a slightly different address to the legitimate website.
  2. Make sure that you are on a secure website before entering personal information. The way to tell is to look at the url:
·         A secure connection's address will begin with https
·         An unsecure connection will begin with http
Spam

  1. Spam is 'junk email' that is sent automatically to thousands, or even millions, of email inboxes. Spam overruns your inbox very quickly and it is a pain to have to delete all of these unwanted emails every day.
  2. 'Spammers' send these unwanted emails for a range of different reasons including:

·         Advertising low quality products
·         Spreading viruses
·         Phishing purposes

Spammers get your email address from a range of sources. This is called 'harvesting email addresses'. The sources include:

·         Mailing lists
·         Chat rooms
·         Programs that scour websites for email addresses
·         Bought illegally from dishonest employee's of internet companies


Ways to reduce the risk of spam
  1. Spam filters are included with most email accounts. These can be used to automatically separate junk email from legitimate emails. You can then quickly delete the contents of the junk email folder.
  2. Don't post your email address in public websites like chat rooms or social networking sites.