A company recycles digital devices - Edexcel - GCSE Computer Science - Question 5 - 2018 - Paper 1
Question 5
A company recycles digital devices. It uses computers and networks in its business.
(a) The company stores details of its business such as recycling statistics on a... show full transcript
Worked Solution & Example Answer:A company recycles digital devices - Edexcel - GCSE Computer Science - Question 5 - 2018 - Paper 1
Step 1
Explain the type of access to the statistics file a student on work experience at the company should be given.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The student should be given 'Read Only' access to the statistics file. This ensures that while the student can view and learn from the data, they cannot modify or delete it, protecting sensitive information and maintaining the data integrity. Allowing 'No Access' would prevent the student from gaining valuable experience and insights.
Step 2
Identify the term that refers to software that is out of date and vulnerable to cyberattack.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is D. Unpatched.
Step 3
Explain two ways in which the improper disposal of digital devices could be harmful to human health.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Disposal of digital devices in a landfill could release dangerous chemicals, such as mercury or lead, into drinking water, which can have severe health implications for the community.
Burning digital devices to dispose of them can expose workers to toxic fumes, increasing the risk of respiratory issues and other health hazards.
Step 4
Describe what is meant by the term ‘penetration testing’ when applied to networks.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Penetration testing refers to the practice of simulating cyberattacks on a network to identify vulnerabilities that could be exploited by attackers. It involves assessing the network's defenses and ensuring that any weaknesses can be identified and remedied before they are actually targeted by malicious actors.
Step 5
State two checks that are carried out during a code review.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Identifying programming practices, such as adherence to coding standards and best practices.
Checking for security vulnerabilities to ensure that the code is resilient against potential attacks.