Number system assessment
This is a quick assessment for the number system section. Please include your school email so that you can get a copy of the assessment with your response.
Computer viruses, Trojans, adware and spyware are different types of malware. Describe the similarities and differences between these different types of malware. Your answer should also describe measures that can be taken to reduce the risks from these malware
In recent years, there has been a large growth in the use of cloud storage. Discuss the advantages and disadvantages of using cloud storage.In your answer you should include an explanation of the reasons for the large growth in recent years and consider any legal, ethical and environmental issues related to the use of cloud storage.
Social engineering is often used to try to gain unauthorised access to a computer system. Phishing is a commonly used social engineering technique where emails are sent that pretend to be from a reputable organisation/company to try and obtain personal details. Describe another two social engineering techniques. You should also explain measures that an organisation can take to try to reduce the security risks from phishing and the two other social engineering techniques you have described.
A copy of your responses will be emailed to the address you provided.
Page 1 of 1
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google.
Terms of Service