6.4 Give three functions of an operating system. (3)
Blog
5.5 A company that provides an internet connection for a m…
5.5 A company that provides an internet connection for a monthly fee. (1)
2.6 Write the function used to get the answer in cell B1…
2.6 Write the function used to get the answer in cell B14 (2)
3.3 What is the purpose of a Primary Key? (1)
3.3 What is the purpose of a Primary Key? (1)
QUESTION 3 Multiple Choice Question. Choose the correct…
QUESTION 3 Multiple Choice Question. Choose the correct answer for each question 3.1 Memory that is lost when the computer is switched off and work is not saved. (1)
4.8 Using the Internet we must be able to determine which…
4.8 Using the Internet we must be able to determine which website is safe by looking at its address. Some techniques used by hackers to make users visit their web page are: Cybersquatting Typosquatting Thin content Content farms Spam page Briefly explain what Cybersquatting and Spam pages are. (2)
3.13 A WPAN network, usually referred to as a WLAN, is a……
3.13 A WPAN network, usually referred to as a WLAN, is a… (1)
4.5 How do VPN’s create safe and secure connections over t…
4.5 How do VPN’s create safe and secure connections over the Internet? (1)
3.8 In a cell reference, example B2, what does the letter…
3.8 In a cell reference, example B2, what does the letter refer to? (1)
3.4 A WPAN network is a …usually referred to as a WLAN (…
3.4 A WPAN network is a …usually referred to as a WLAN (1)