Edexcel iGCSE ICT Topic 3 (Operating
Online)
Data - correct answer-Facts, figures, and other evidence gathered through observations.
Information - correct answer-Data converted into a meaningful and useful context
Unauthorised access - correct answer-Where computer systems or data are used by people
who are not the intended users.
Phishing - correct answer-a technique to gain personal information for the purpose of identity
theft, usually by means of fraudulent e-mail
Pharming - correct answer-An online scam that attacks the browser's address bar. Users
type in what they think is a valid website address and are unknowingly redirected to an
illegitimate site that steals their personal information.
Firewall - correct answer-a part of a computer system or network that is designed to block
unauthorized access while permitting outward communication.
CAPTCHA Test - correct answer-a type of challenge-response test used in computing to
determine whether or not the user is human.
Malware - correct answer-software that is intended to damage or disable computers and
computer systems.
Antivirus - correct answer-software that is specifically designed to detect viruses and protect
a computer and files from harm
Spyware - correct answer-A type of Malware that locates and saves data from users without
them knowing about it.
Ransomware - correct answer-a type of malicious software designed to block access to a
computer system until a sum of money is paid.
Full Backup - correct answer-Backup that copies all data from a system.
Incremental backup - correct answer-A type of partial backup that involves copying only the
data items that have changed since the last partial backup. This produces a set of
incremental backup files, each containing the results of one day's transactions
Reduced social interaction - correct answer-A byproduct of using technology more often
where people do not interact as much in person
Online)
Data - correct answer-Facts, figures, and other evidence gathered through observations.
Information - correct answer-Data converted into a meaningful and useful context
Unauthorised access - correct answer-Where computer systems or data are used by people
who are not the intended users.
Phishing - correct answer-a technique to gain personal information for the purpose of identity
theft, usually by means of fraudulent e-mail
Pharming - correct answer-An online scam that attacks the browser's address bar. Users
type in what they think is a valid website address and are unknowingly redirected to an
illegitimate site that steals their personal information.
Firewall - correct answer-a part of a computer system or network that is designed to block
unauthorized access while permitting outward communication.
CAPTCHA Test - correct answer-a type of challenge-response test used in computing to
determine whether or not the user is human.
Malware - correct answer-software that is intended to damage or disable computers and
computer systems.
Antivirus - correct answer-software that is specifically designed to detect viruses and protect
a computer and files from harm
Spyware - correct answer-A type of Malware that locates and saves data from users without
them knowing about it.
Ransomware - correct answer-a type of malicious software designed to block access to a
computer system until a sum of money is paid.
Full Backup - correct answer-Backup that copies all data from a system.
Incremental backup - correct answer-A type of partial backup that involves copying only the
data items that have changed since the last partial backup. This produces a set of
incremental backup files, each containing the results of one day's transactions
Reduced social interaction - correct answer-A byproduct of using technology more often
where people do not interact as much in person