A company recycles digital devices - Edexcel - GCSE Computer Science - Question 5 - 2018 - Paper 1
Question 5
A company recycles digital devices. It uses computers and networks in its business.
(a) The company stores details of its business such as recycling statistics on a... show full transcript
Worked Solution & Example Answer:A company recycles digital devices - Edexcel - GCSE Computer Science - Question 5 - 2018 - Paper 1
Step 1
Explain the type of access to the statistics file a student on work experience at the company should be given.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The student should be given 'Read Only' access to the statistics file. This means they can view the contents of the file but cannot make any changes or deletions. This is crucial to ensure that the student does not accidentally modify or delete any sensitive or relevant information stored on the server.
Step 2
Identify the term that refers to software that is out of date and vulnerable to cyberattack.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is D. Unpatched.
Step 3
Explain two ways in which the improper disposal of digital devices could be harmful to human health.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Disposal of digital devices in a landfill could lead to dangerous chemicals leaching into the soil and potentially contaminating drinking water.
Burning electronic waste, such as circuit boards, releases toxic fumes that can expose individuals to harmful substances, increasing the risk of respiratory issues and other health problems.
Step 4
Describe what is meant by the term ‘penetration testing’ when applied to networks.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Penetration testing is a simulated cyber attack on a network to identify vulnerabilities and weaknesses that could be exploited by malicious actors. This process helps organizations to assess their security measures and improve their defenses.
Step 5
State two checks that are carried out during a code review.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Identifying programming practices that are not followed, such as coding standards.
Checking for inefficiencies in the code that could lead to performance issues.