Number system assessment
This is a quick assessment for the number system section. Please include your school email so that you can get a copy of the assessment with your response.
Email address *
Computer viruses, Trojans, adware and spyware are different types of malware. Describe the similarities and differences between these different types of malware. Your answer should also describe measures that can be taken to reduce the risks from these malware *
9 points
Your answer
In recent years, there has been a large growth in the use of cloud storage. Discuss the advantages and disadvantages of using cloud storage.In your answer you should include an explanation of the reasons for the large growth in recent years and consider any legal, ethical and environmental issues related to the use of cloud storage. *
9 points
Your answer
Social engineering is often used to try to gain unauthorised access to a computer system. Phishing is a commonly used social engineering technique where emails are sent that pretend to be from a reputable organisation/company to try and obtain personal details. Describe another two social engineering techniques. You should also explain measures that an organisation can take to try to reduce the security risks from phishing and the two other social engineering techniques you have described. *
6 points
Your answer
A copy of your responses will be emailed to the address you provided.
Submit
Never submit passwords through Google Forms.
reCAPTCHA
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Additional Terms