1. Which is more valuable, a computer or the data it contains? Explain your answer. (3 marks) The data is more valuable because in some cases, there can be private financial information on the computer that can be endangered if someone were to have access to that information. Also the physical computer can be replaced if it is damaged, but the data on a computer cannot be replaced.
2. Describe some potential issues if an organization such as a business or school, were to have its network hacked. (3 marks) If an organization such as a school or business were to have its network it can endanger the entire network and the hacker could possibly have access to all the information of the network, such as financial information, internet usage, etc.
3. In your own words explain what a virus is. (2 marks) A virus is a piece of coding that can replicate itself and potentially harm your computer.
4. List some ways a virus can be spread. (2 marks)
a. They can be transmitted as e-mail attachments b. They can attach themselves to program file
5. Match the following: (3 marks)
Worms Trojan Spyware This keeps track of web pages that you look at and then sends the data to a third party This is a type of virus that replicates itself within a system so many times it simply clogs up the system resources This virus is called this because it is disguised as a file a user would be tempted to open e.g. a game or graphics file
TEJ2O1: Networking
6. What is the role of a Firewall? (2 marks) The role of a firewall is to help protect a network from threats that might try to break in and gain access to the computer and its data. The firewall also filters the information coming through the internet connection into your personal computer.
7. Find an article on the Internet on the effects of hacking (to individuals or business) OR ethical use of computers. Summarize it in 100 words or less below. (Also attach the original article - You can either print it out or provide the link to it.) (10 marks)
Computer hacking can effect businesses in a number of ways. One of the best examples of this would be the financial information of a business. If a hacker were to gain access to the financial information of a business then it could potentially harm the business. Also hackers could also have access to the information of employees and clients such as, their e-mail, addresses and even their identities. A perfect real-life example of this would be when SONY was hacked in 2011. This cost SONY more than $170,000 just to recover from being hacked. Not only can hackers harm businesses but they can also harm individuals, for example if a hacker were to gain access to someones personal information such as their, financial information, identity, and address.