Describe Four Strategies That You Could Use To Minimise The Dangers of Using Social Networking Sites To Make New Friends

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Describe four strategies that you could use to minimise the dangers of using social

networking sites to make new friends.


Know how to block and report unwanted users,
Never arrange to meet anyone alone
Always tell an adult first when arranging to meet someone
Always meet in a public place
Avoid inappropriate disclosure of personal data/set privacy settings/Avoid giving email address
Avoid inappropriate disclosure of your own name/Avoid giving your full name
Avoid giving your address
Avoid giving your school name
Avoid displaying a picture in school uniform
Do not display pictures taken at home/Do not display pictures taken of the school with the
name
attached/Do not send pictures/videos of yourself to strangers
Ensure that the person you are befriending has very secure privacy settings
Check profiles before contacting people
Verify persons contact details with other trusted people/friends
Describe how a satellite navigation system (sat nav) in a motor vehicle would calculate the quickest
route from A to B.

Destination B is input by driver


Position of motor vehicle at A is calculated using GPS
using data transmitted from 3/4 satellites
Algorithm calculates shortest distance from A to B (going through C)
Algorithm calculates distance from A to B not going through C
Makes allowances for traffic in town C
Takes into account average road speeds
using traffic/speed sensors on roads
Takes into account regular updates of traffic conditions
Takes into account max. speed on the road/type of road
Describe how data is sent from a networked computer to a computer on a different network

Router
The network software in the original computer determines that the destination computer is on
a
different network...
...using IP addresses
Data is sent to the switch/hub and then passed to router
the router then passes it to the router of the other network
that router passes it to the switch/hub
to the destination computer
Bridge
The computer sends the data to the bridge via the hub/switch
...using MAC addresses
if the protocol/MAC address is same, bridge passes data to the other network
Bridge passes it to the switch/hub
to destination computer with correct MAC address
Describe how RFID technology reads the details from the chip

The chip is presented near a computer with a radio-frequency scanner


The scanning antenna puts out radio-frequency signals in a relatively short range.
It provides a means of communicating with the transponder/the RFID tag
The scanning device provides energy
so that the chips can broadcast the information in them
for the computer to read.
Explain why RFID technology is used for reading data from passports

More secure than a traditional passport as biometric measurement data difficult to forge
Counterfeits can be more easily identified than non-RFID passports
More rapid flow at security check points/quicker than reading it manually
Explain what absolute referencing is and why it is needed in this example

When formulae are replicated/copied/dragged down/fill down


some cell references must remain unchanged
If it wasnt used when the formula in E4 was replicated down it would multiply by B2, B3 etc.
These cells are either blank or contain values not equal to 25%/need to be 25%
Give four reasons why an internet search to find relevant information is not always fast

Computer might be infected with spyware detecting key presses which slows down data
transfer
speeds over the internet
Computer might be infected with viruses taking up memory and limiting bandwidth.
If the computers memory is close to full, data transfer speed over the internet can slow down
considerably
The search might be too general giving irrelevant information as well as relevant information
Search providers add targeted marketing adverts from companies to the search results/ your
search results are gathered to target further marketing/advertising
Describe five improvements to the worksheet that would make it more appealing to 11-year-old
students.

Change the font type to make it more informal/appealing


Change the font size bigger
Simplify the language
Make the heading centred
Make the font size for the heading larger than the body text
Add interesting/relevant images
Bold/underline/highlight/italicised keywords
Bold/underline/highlight headings
Line spacing after paragraphs/in paragraphs
Colour text to emphasise keywords/headings
Change the existing border to a more interesting/relevant border
Explain why you might want to insert a section break in a document.

When you want to apply different formatting in the same page without disrupting the
formatting of
the whole page.
When you want to use columns in a page, and have different amounts of columns on the same
page.
When you want to use a heading across the whole page but the text below is in several
columns.
When you don't want headers on pages with a title, but you do want them on other pages.
If you didn't have them, each page would have the same header.
To enable page orientation to change between 2 pages.
Chip and PIN is the new, more secure way to pay with credit or debit cards. Discuss the accuracy of
this statement with regard to developments, since and including the use of magnetic stripe cards at
EFTPOS terminals and ATMs.

Examples of more secure:


Data more difficult to copy
Larger amount of information can be stored
Disabled people find it easier than signing
Reduces disputes at checkouts over validity of signature/Saves time at checkouts
Not affected by magnetic fields
Even when the card is stolen, the thief still needs the PIN, so it is much safer
Magnetic stripe reader had to be in a fixed location.
If the transaction did not take place near a terminal (in a restaurant, for example) the card had
to
be taken away from the customer to the card machine.
It was easily possible for a dishonest employee to swipe the card surreptitiously through a
cheap
machine...
...which would take a couple of seconds to record the information on the card and stripe
Even at the terminal, the criminal could bend down in front of the customer and swipe the card
on
a hidden reader.
Illegal cloning of cards easy, and a common occurrence.
only the magnetic stripe can be copied, and a copied card cannot be used on a PIN terminal
The introduction of chip and PIN coincided with wireless data communications technology
becoming inexpensive and widespread
Wireless PIN pads were introduced that could be brought to the customer and used without the
card ever being out of sight
However, this would have been possible, had the technology been available, with magnetic
stripe
cards
Chip and PIN and wireless together reduce the risk of cloning of cards by brief swiping.
Examples of not always secure because:
Cards can still be cloned
People can be careless when using their PIN.
Credit and debit card fraud has gone down with chip and pin
ATM fraud has gone up.
Hidden cameras sometimes are used to see which keys are pressed for the PIN.
The advent of chip and pin has also generated a rise in phishing

You might also like