Foreign Key (2 marks)
Describe the role of a foreign key in a relational database.
Foreign Key (2 marks) Read More »
Describe the role of a foreign key in a relational database.
Foreign Key (2 marks) Read More »
Discuss the importance of using email confirmations as a security measure.
Email Confirmations as a Security Measure. (3 marks) Read More »
Explain how automatic software updates contribute to cybersecurity.
Automatic Software Updates (3 marks) Read More »
Explain two methods of biometric security that can be used on mobile devices.
Biometric Security (2 marks) Read More »
Explain what a computer virus is and how it differs from a trojan.
Virus vs Trojan (3 marks) Read More »
Phishing often involves the use of electronic communication. Describe a common characteristic of phishing emails that individuals should be aware of.
Phishing (2 Marks) Read More »
Explain how ‘shouldering’ can lead to a security breach, and provide one example of where it might occur.
Shouldering (2 Marks) Read More »