Вы находитесь на странице: 1из 3

ANSWER SCHEME

SECTION A
1. B
2. C
3. A
4. D
5. C
6. D
7. A
8. B
9. B
10. C
11. A
12. D
13. C
14. A
15. B

SECTION B
16. Leisure Villa and Resort
17. 3 days
18. 28,29, and 30 May 2013
19. Classic Ballroom, Leisure Villa and Resort
20. 10.00 a.m. to 9.00 p.m.

21. Special offers for photo and videography
22. Affordable holiday packages
23. Beauty and slimming products, bridal outfits, jewellery
24. Door gift and lucky draw prizes
25. Call or email

SECTION C

26. a) Internet Identity thives upload malware into peoples personal computers and
steal confidential documents by hacking into personal information that is stored in
their hard drives, and then recreate new confidential information
b) Malware is any malicious software (like viruses, Trojan horses, worms and
others) that is designed to infiltrate destroy or damage a computer system.
27. a) malware subtypes
b) Internet identity thieves want to damage computer files and infect other
computers on purpose.

28. a) Hackers find it easy to gain access to other computers and steal information
when worms self- replicate, and send copies of themselves to other computers.
b) They hide the fact that a hacker has gained access to someones computer. /
they are difficult to detect and may take years to be discovered.

29. a) They want to open fraudulent bank accounts, apply for credit cards and make
large purchases, obtain employment through false means, or sell individuals personal
information to other thieves.
b ) Spyware, adware and Trojans may be embedded in the downloaded
programmes when downloading free applications over file sharing networks.
30. Accept any suitable answer
They want to damage computers so that they can gain access to and steal confidential
information, which is then used to commit crimes as using others identity to open bank
accounts, obtain credit cards, get jobs fraudulently and even sell private information to
other thieves for a fee.

31. Summary
Content = 10 marks
Language = 5 marks

Content:
1 Internet Identity thieves hack into peoples confidential documents

2. Internet Identity reconstructs personal information (line 2)


3. Internet Identity upload malware that invades and damages computer systems before
stealing information (line 5)

4. Some malware are intentionally spread through emails, attachments and unknown
websites

5. (Malware) self copying to destroy files, which are hacked into easily thereafter (line
20)

6. Malware hides viruses and even hackers activities. ( line 23)

7. Some spy on peoples Internet activities to collect information and to record users
typing habits. (line 26)

8. Malware slows down Internet connection, allowing thieves to steal information, which
they sell to others, or use to open bank accounts, get credit cards to buy lavishly, or
find jobs fraudulently. (line 32-35)

9. We should be cautious when using the internet, opening emails and links, or
downloading software from unknown sites as malware is spread (line 40-42)

10. Thus, Use firewalls, install anti- spyware and update it regularly. (line 46)

Вам также может понравиться