QUESTION 1. 6
4 Choose six correct terms from the following list to complete the spaces in the paragraphs below:
• encryption
• file name
• firewall
• HTML tags/text
• IP address
• protocol
• proxy server
• SSL certificate
• web server name
A user enters a URL. The web browser breaks up the URL into three components:
1 ........................................................
2 ........................................................
3 ........................................................
The web server returns the selected web page.
The web browser reads the ............................................................ from the selected page and
shows the correctly formatted page on the user’s screen.
A ............................................................ is used between the user’s computer and the network to
examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a ............................................................ is
used between the computer and web server; this device uses a cache to store the website home
page after it has been accessed for the first time.
[6]
© UCLES 2015 0478/11/M/J/15
, QUESTION 2. 2
1 (a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
Statement True False
they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]
(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
Description Security issue
malicious code installed on the hard drive of a
user’s computer or on the web server; this code
hacking
will re-direct user to a fake web site without their
consent
software that gathers information by monitoring
key presses on a user’s computer and relays
pharming
the information back to the person who sent the
software
program or code that replicates itself and is
designed to amend, delete or copy data and files phishing
on a user’s computer without their consent
the act of gaining illegal access to a computer
spyware
system without the owner’s consent
creator of code sends out a legitimate-looking
email in the hope of gathering personal and
virus
financial data; it requires the recipient to follow a
link in the email or open an attachment
[4]
© UCLES 2015 0478/12/M/J/15
4 Choose six correct terms from the following list to complete the spaces in the paragraphs below:
• encryption
• file name
• firewall
• HTML tags/text
• IP address
• protocol
• proxy server
• SSL certificate
• web server name
A user enters a URL. The web browser breaks up the URL into three components:
1 ........................................................
2 ........................................................
3 ........................................................
The web server returns the selected web page.
The web browser reads the ............................................................ from the selected page and
shows the correctly formatted page on the user’s screen.
A ............................................................ is used between the user’s computer and the network to
examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a ............................................................ is
used between the computer and web server; this device uses a cache to store the website home
page after it has been accessed for the first time.
[6]
© UCLES 2015 0478/11/M/J/15
, QUESTION 2. 2
1 (a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
Statement True False
they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]
(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
Description Security issue
malicious code installed on the hard drive of a
user’s computer or on the web server; this code
hacking
will re-direct user to a fake web site without their
consent
software that gathers information by monitoring
key presses on a user’s computer and relays
pharming
the information back to the person who sent the
software
program or code that replicates itself and is
designed to amend, delete or copy data and files phishing
on a user’s computer without their consent
the act of gaining illegal access to a computer
spyware
system without the owner’s consent
creator of code sends out a legitimate-looking
email in the hope of gathering personal and
virus
financial data; it requires the recipient to follow a
link in the email or open an attachment
[4]
© UCLES 2015 0478/12/M/J/15