User Management. (2 marks)
Describe a user management function in an operating system and explain how it enhances security.
User Management. (2 marks) Read More »
Describe a user management function in an operating system and explain how it enhances security.
User Management. (2 marks) Read More »
Explain what is meant by peripheral management in operating systems and discuss the role of drivers.
Peripheral Management and Drivers. (2 marks) Read More »
Describe how an operating system manages memory and how this contributes to multitasking.
Memory Management. (2 marks) Read More »
Explain the importance of user interface design in operating systems. Include two features that enhance user experience.
User Interface. (2 marks) Read More »
List and explain two physical security measures that can prevent unauthorised access to computer systems.
Physical Security. (2 marks) Read More »
Explain how encryption can be used to secure data against threats like interception and unauthorised access.
Encryption and Data Security. (4 marks) Read More »
Discuss how firewalls can be configured to prevent SQL injection attacks. Include an explanation of what SQL injection is.
Firewalls and SQL Injection. (4 marks) Read More »
Explain how anti-malware software can prevent data interception and theft.
Anti-Malware Software. (2 marks) Read More »
Describe the process and purpose of penetration testing in the context of identifying and mitigating system vulnerabilities.
Penetration Testing. (3 marks) Read More »
What is a SQL injection, and how can it affect a database?
SQL Injections. (2 marks) Read More »