A company recycles digital devices - Edexcel - GCSE Computer Science - Question 5 - 2018 - Paper 1
Question 5
A company recycles digital devices. It uses computers and networks in its business.
(a) The company stores details of its business such as recycling statistics on a... show full transcript
Worked Solution & Example Answer:A company recycles digital devices - Edexcel - GCSE Computer Science - Question 5 - 2018 - Paper 1
Step 1
Explain the type of access to the statistics file a student on work experience at the company should be given.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The student should be given 'Read Only' access to the statistics file. This means they can view the file but cannot modify or delete any information. This prevents the risk of accidental changes and ensures that sensitive or irrelevant information remains protected from unauthorized access.
Step 2
Identify the term that refers to software that is out of date and vulnerable to cyberattack.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D Unpatched
Step 3
Explain two ways in which the improper disposal of digital devices could be harmful to human health.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Disposal of digital devices in a landfill can lead to dangerous chemicals leaching into the ground, contaminating drinking water and posing health risks to humans.
Improper disposal can involve burning electronic devices, which releases toxic fumes and particulates that are harmful when inhaled, causing respiratory issues and other health problems.
Step 4
Describe what is meant by the term ‘penetration testing’ when applied to networks.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Penetration testing refers to the simulated cyber attack on a network to identify vulnerabilities. This involves skilled professionals attempting to exploit known weaknesses in the system, allowing the organization to address security flaws before they can be exploited by actual attackers.
Step 5
State two checks that are carried out during a code review.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Reviewing coding practices to ensure compliance with industry standards.
Identifying potential security vulnerabilities within the code.