3.3 What is the purpose of a Primary Key? (1)
QUESTION 3 Multiple Choice Question. Choose the correct…
QUESTION 3 Multiple Choice Question. Choose the correct answer for each question 3.1 Memory that is lost when the computer is switched off and work is not saved. (1)
4.8 Using the Internet we must be able to determine which…
4.8 Using the Internet we must be able to determine which website is safe by looking at its address. Some techniques used by hackers to make users visit their web page are: Cybersquatting Typosquatting Thin content Content farms Spam page Briefly explain what Cybersquatting and Spam pages are. (2)
3.13 A WPAN network, usually referred to as a WLAN, is a……
3.13 A WPAN network, usually referred to as a WLAN, is a… (1)
4.5 How do VPN’s create safe and secure connections over t…
4.5 How do VPN’s create safe and secure connections over the Internet? (1)
3.8 In a cell reference, example B2, what does the letter…
3.8 In a cell reference, example B2, what does the letter refer to? (1)
3.4 A WPAN network is a …usually referred to as a WLAN (…
3.4 A WPAN network is a …usually referred to as a WLAN (1)
3.5 What is an object in Scratch which performs functions…
3.5 What is an object in Scratch which performs functions controlled by scripts? (1)
4.7 The Internet is a global network of millions of comput…
4.7 The Internet is a global network of millions of computing devices that are connected to each other. Name the two main types of computers found in a network. (2)
QUESTION 4 Answer the following questions 4.1 How…
QUESTION 4 Answer the following questions 4.1 How are files sent from one device to another> (1)