7.1 Name ONE legally acceptable use of a file-sharing application, such as BitTorrent - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Question 7
7.1 Name ONE legally acceptable use of a file-sharing application, such as BitTorrent.
7.2 Give your opinion regarding the following statement by giving TWO reasons... show full transcript
Worked Solution & Example Answer:7.1 Name ONE legally acceptable use of a file-sharing application, such as BitTorrent - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Step 1
Name ONE legally acceptable use of a file-sharing application, such as BitTorrent.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One legally acceptable use of a file-sharing application, like BitTorrent, is for the distribution of open-source software, where the software is freely available for public use and modification.
Step 2
Give your opinion regarding the following statement by giving TWO reasons or examples to support your answer:
'The Internet offers its users some privacy.'
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cookies and Tracking: The Internet often uses cookies that track users’ behavior, leading to targeted advertising. This shows that user actions are monitored, suggesting a lack of privacy.
Data Surveillance: Various online services collect personal data for analytics and service improvement, which may be shared with third parties, compromising individual privacy.
Step 3
Explain the term geotagging.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Geotagging refers to the process of adding geographical identification metadata to various media, such as photographs, which may include GPS coordinates that denote the specific location where the photo was taken.
Step 4
Why do some game reserves discourage visitors from placing geotagged photographs of rhinos on social media?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Some game reserves discourage the sharing of geotagged photographs to protect rhinos from poachers who might use the precise location information to track and hunt these endangered animals.
Step 5
State ONE possible way of preventing other users from tagging you in photographs on Facebook.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One way to prevent other users from tagging you in photographs on Facebook is by adjusting your privacy settings to restrict tagging permissions, thereby requiring approval before any tag can be added.
Step 6
State TWO advantages of cars that are connected to the Internet.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Remote Monitoring: Connected cars can provide real-time monitoring for vehicle performance and maintenance, helping to enhance safety and efficiency.
Traffic Updates: These vehicles can receive up-to-date traffic information that aids in navigation, optimizing travel routes.
Step 7
State TWO typical ways in which your computer may be misused by cybercriminals, if they use your computer as part of their botnet.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
DDoS Attacks: Cybercriminals can use your computer to perform Distributed Denial-of-Service (DDoS) attacks, overwhelming targeted servers by using the collective power of numerous infected systems.
Spam Distribution: Your computer can be exploited to send unsolicited spam emails, which may include phishing attempts or malicious software.