Beruflich Dokumente
Kultur Dokumente
The following questions have been taken from the Cambridge Checkpoints 2007
– VCE IT Applications – Potts. (Also check out the online quizzes at
www.cambridge.edu.au/checkpoints)
CHAPTER 6
Data and Information Security
Question 1
Explain the meaning of the term data integrity.
Question 3
Explain the purpose of data validation. Give one example.
Question 7
VirtualArtShow.com is an on-line art gallery. The purpose of it is to allow
potential clients to view and purchase artworks on-line. Each piece of art is
photographed and then this photograph is placed in the software for display on
the website. It has come to the manager’s attention that some of the
photographs of the artworks have been altered on the website.
Question 11
The following events happen frequently in offices. Choose four of the events and
explain why each one would represent a security threat to the data stored in the
organisation’s information system.
d. Backup files are stored in the same room as the original files.
a. Explain how data encryption helps to preserve the integrity of data being
transmitted across networks.
b. If unencrypted data is called plain text, what is encrypted data called?
Question 16
A chemistry student is searching for a shareware software to help her understand
the Periodic Table of Elements. She finds a program called ChemTable.exe and
downloads it off the Internet. Before she can use it, however, a friend warns her
that ChemTable is a Trojan Horse that has reformatted his hard disk.
b. Trojan Horses and viruses can destroy valuable information. How is a virus
different from a Trojan Horse?
Feature 1
Feature 2
b. Select one feature from part a. and explain why this is necessary.
Question 21
In general, there are three types of backup strategies:
a. A complete backup
b. A partial backup
c. An incremental backup
Concern:
Recommendation 2 – all program files be backed up daily.
Concern:
Concern: