Four statements about cookies are shown in the table below. Study each statement. Tick (✓) to show whether the statement is true or false. Statement True False they are a form of spyware they are used only in advertising they are used to track browser use they act in the same way as a virus Five descriptions and five security issues are shown below. Draw a line to connect each description to the correct security issue. Description Security issue malicious code installed on the hard drive of a user’s computer or on the web server; this code will re-direct user to a fake web site without their consent hacking software that gathers information by monitoring key presses on a user’s computer and relays the information back to the person who sent the software pharming program or code that replicates itself and is designed to amend, delete or copy data and files on a user’s computer without their consent phishing the act of gaining illegal access to a computer system without the owner’s consent spyware creator of code sends out a legitimate-looking email in the hope of gathering personal and financial data; it requires the recipient to follow a link in the email or open an attachment virus 2210_s15_qp_12 THEORY 2015 Paper 1, Variant 2 View
Complete the statements about cookies. Use only terms from the list. Not all terms need to be used. Some terms may be used more than once. binary close denary expire hexadecimal image malware operating system permanent persistent session sound temporary web browser Cookies are small text files that are stored by a . cookies are text files that are deleted when the is closed. cookies are text files that are stored on a user’s secondary storage device until they are manually deleted or they . Give three examples of the use of cookies. 2210_w24_qp_13 THEORY 2024 Paper 1, Variant 3 View