4.8 Using the Internet we must be able to determine which website is safe by looking at its address. Some techniques used by hackers to make users visit their web page are: Cybersquatting Typosquatting Thin content Content farms Spam page Briefly explain what Cybersquatting and Spam pages are. (2)
Blog
3.13 A WPAN network, usually referred to as a WLAN, is a……
3.13 A WPAN network, usually referred to as a WLAN, is a… (1)
4.5 How do VPN’s create safe and secure connections over t…
4.5 How do VPN’s create safe and secure connections over the Internet? (1)
3.8 In a cell reference, example B2, what does the letter…
3.8 In a cell reference, example B2, what does the letter refer to? (1)
3.4 A WPAN network is a …usually referred to as a WLAN (…
3.4 A WPAN network is a …usually referred to as a WLAN (1)
3.5 What is an object in Scratch which performs functions…
3.5 What is an object in Scratch which performs functions controlled by scripts? (1)
4.7 The Internet is a global network of millions of comput…
4.7 The Internet is a global network of millions of computing devices that are connected to each other. Name the two main types of computers found in a network. (2)
6.2 Name any operating system for a smart phone or a consu…
6.2 Name any operating system for a smart phone or a consumer tablet. (1)
QUESTION 4 Answer the following questions 4.1 How…
QUESTION 4 Answer the following questions 4.1 How are files sent from one device to another> (1)
4.2 For a file to be transmitted from the sender to the re…
4.2 For a file to be transmitted from the sender to the receiver, protocols are put in place. Why is this necessary? (1)