Get premium membership and access questions with answers, video lessons as well as revision papers.
Logic bomb
A logic bomb lies dormant until a specific piece of program code is activated
A typical activator for a logic bomb is a date
The logic bomb checks the system date and does nothing until a pre-programmed date and time is reached
A logic bomb may wait for a certain message from its programmer before executing its code
Macro virus
A macro virus is written in a macro programming language which is a normal part of an application such as a word processor/ spreadsheet
A macro enables a short program to be embedded in a document/file and run automatically when the document is opened
The application may be infected so that all future documents created in the application are infected
queen babito answered the question on July 3, 2018 at 02:08
- Security is an important consideration for companies which sell their products over the Internet.
Explain how each of the following can increase security over the Internet.
...(Solved)
Security is an important consideration for companies which sell their products over the Internet.
Explain how each of the following can increase security over the Internet.
https
Paypal
Date posted: July 3, 2018. Answers (1)
- Describe the main responsibilities of each of the following during software development. (i) The project manager (ii) The end user (Solved)
Describe the main responsibilities of each of the following during software development.
(i) The project manager
(ii) The end user
Date posted: July 3, 2018. Answers (1)
- An organisation requires new software. Describe two benefits of custom built software.(Solved)
An organisation requires new software. Describe two benefits of custom built software.
Date posted: July 3, 2018. Answers (1)
- The company uses an intranet. Explain what is meant by an intranet(Solved)
The company uses an intranet. Explain what is meant by an intranet
Date posted: July 3, 2018. Answers (1)
- Describe the purpose of each of the following network resources.
An IP address
A router(Solved)
Describe the purpose of each of the following network resources.
An IP address
A router
Date posted: July 3, 2018. Answers (1)
- Describe the impact of cable failure on A star network, A bus network(Solved)
Describe the impact of cable failure on
i) A star network
ii) A bus network
Date posted: July 3, 2018. Answers (1)
- A company uses a local area network (LAN). Describe the main features of a star network.(Solved)
A company uses a local area network (LAN). Describe the main features of a star network.
Date posted: July 3, 2018. Answers (1)
- Describe two drawbacks of using open source software.(Solved)
Describe two drawbacks of using open source software.
Date posted: July 3, 2018. Answers (1)
- Explain what is meant by application software.(Solved)
Explain what is meant by application software.
Date posted: July 3, 2018. Answers (1)
- A computer requires an operating system and application software.
Describe the main features of a multi-tasking operating system.(Solved)
A computer requires an operating system and application software.
Describe the main features of a multi-tasking operating system.
Date posted: July 3, 2018. Answers (1)
- A computer contains a hard disk.
Explain how data is written to and read from a hard disk.(Solved)
A computer contains a hard disk.
Explain how data is written to and read from a hard disk.
Date posted: July 3, 2018. Answers (1)
- The internal memory of a computer includes RAM and cache memory.
Explain the purpose of each of the following.
RAM
Cache memory(Solved)
The internal memory of a computer includes RAM and cache memory.
Explain the purpose of each of the following.
RAM
Cache memory
Date posted: July 3, 2018. Answers (1)
- Describe the main features of the following file formats for storing
images.
JPEG
Bitmap(Solved)
Describe the main features of the following file formats for storing
images.
JPEG
Bitmap
Date posted: July 3, 2018. Answers (1)
- The students obtain a hard copy of a newspaper article about the school.
Explain how the text of the article could be input to the...(Solved)
The students obtain a hard copy of a newspaper article about the school.
Explain how the text of the article could be input to the computer using OCR software.
Date posted: July 3, 2018. Answers (1)
- Students have been asked to research the history of their school as part of a GCSE project.
The students use the Internet to obtain information...(Solved)
Students have been asked to research the history of their school as part of a GCSE project.
The students use the Internet to obtain information for the project.
Describe the main features of a typical Internet browser.
Date posted: July 3, 2018. Answers (1)
- The ICT staff of a particular organisation are encouraged to become members of the British Computer Society.
Explain how staff will benefit from membership of...(Solved)
The ICT staff of a particular organisation are encouraged to become members of the British Computer Society.
Explain how staff will benefit from membership of the BCS.
Date posted: July 3, 2018. Answers (1)
- Organisations must ensure that employees make appropriate use of ICT.
Describe the main contents of a typical acceptable use policy relating to ICT.(Solved)
Organisations must ensure that employees make appropriate use of ICT.
Describe the main contents of a typical acceptable use policy relating to ICT.
Date posted: July 2, 2018. Answers (1)
- Name and describe the purpose of two other laws relating to ICT(Solved)
Name and describe the purpose of two other laws relating to ICT
Date posted: July 2, 2018. Answers (1)
- Legislation relating to ICT includes the Computer Misuse Act.
Identify two offences included in the Computer Misuse Act.(Solved)
Legislation relating to ICT includes the Computer Misuse Act.
Identify two offences included in the Computer Misuse Act.
Date posted: July 2, 2018. Answers (1)
- Describe the main features of a natural language interface.
(Solved)
Describe the main features of a natural language interface.
Date posted: July 2, 2018. Answers (1)