{"id":2322,"date":"2021-08-21T18:37:16","date_gmt":"2021-08-21T18:37:16","guid":{"rendered":"https:\/\/computerscienced.co.uk\/site\/?page_id=2322"},"modified":"2021-10-06T20:58:51","modified_gmt":"2021-10-06T20:58:51","slug":"ks4-ocr-1-4-network-security-guess-the-keyword","status":"publish","type":"page","link":"https:\/\/computerscienced.co.uk\/site\/ks4-ocr-1-4-network-security-guess-the-keyword\/","title":{"rendered":"KS4 OCR 1.4 Network Security &#8211; Guess the Keyword"},"content":{"rendered":"\n<p>Your randomised keyword starter task is generated below the separator.  To produce the answers slide simply click on the &#8216;Export to PPTX button&#8217;.  This will save it as a Microsoft PowerPoint document.  To produce a slide without the answers on click on the &#8216;Hide\/Reveal keywords&#8217; button then click on the &#8216;Export to PPTX button&#8217;.  <\/p>\n\n\n\n<p><strong>Please note<\/strong> &#8211; As this is randomised you may occasionally get keywords appearing twice.  Simply click on the &#8216;Randomise the keywords&#8217; button and it will have another go at randomising the keywords.   <\/p>\n\n\n\n<p><strong>Please also keep in mind<\/strong> that the method used to export to PowerPoint is fairly basic so you may need to style the outputted PowerPoint slides yourself.      <\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<style>\ntable, td, th {\n    border: 0px solid rgba(0,0,0,0);\n    padding:0px;\n}\nbody, button, input, select, textarea {\nfont-family:Calibri;\n}\n<\/style>\n<script src=\"https:\/\/cdn.jsdelivr.net\/npm\/pptxgenjs@3.7.0\/dist\/pptxgen.bundle.js\"><\/script>\n<table id=\"tableId\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\" colspan=\"2\">\n    <p style=\"font-family:Calibri; font-size:30px\"><b><strong>Instructions: <\/strong><\/b>Read through the definitions below and figure out what the key word is.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\" colspan=\"2\">\n<p style=\"font-family:Calibri; font-size:30px\"><strong>Challenge: <\/strong>Explain how the word is relevant to what we have studied<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\" colspan=\"2\">\n<p style=\"font-family:Calibri; font-size:30px\"><\/p>\n<\/td>\n<\/tr>\n<tr style=\"border:solid 1px;\">\n<td style=\"width: 25%; border:solid 1px; border-color: #000;\">\n<p style=\"font-family:Calibri; font-size:30px\"><strong>Keyword<\/strong><\/p>\n<\/td>\n<td style=\"width: 75%; border:solid 1px; border-color: #000;\">\n<p style=\"font-family:Calibri; font-size:30px\"><strong>Definition<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"myText1\" style=\"width: 25%; border:solid 1px; border-color: #000;text-transform:capitalize;\">\n<p>&nbsp;<\/p>\n<\/td>\n<td id=\"myTextHINT1\" style=\"width: 75%; border:solid 1px; border-color: #000;font-family:Calibri; font-size:14px;\">\n<p style=\"font-family:Calibri; font-size:30px\">&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"myText2\" style=\"width: 25%; border:solid 1px; border-color: #000;text-transform:capitalize;\">\n<p>&nbsp;<\/p>\n<\/td>\n<td id=\"myTextHINT2\" style=\"width: 75%; border:solid 1px; border-color: #000;font-family:Calibri; font-size:14px;\">\n<p style=\"font-family:Calibri; font-size:30px\">&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"myText3\" style=\"width: 25%; border:solid 1px; border-color: #000;text-transform:capitalize;\">\n<p>&nbsp;<\/p>\n<\/td>\n<td id=\"myTextHINT3\" style=\"width: 75%; border:solid 1px; border-color: #000;font-family:Calibri; font-size:14px;\">\n<p style=\"font-family:Calibri; font-size:30px\">&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"myText4\" style=\"width: 25%; border:solid 1px; border-color: #000;text-transform:capitalize;\">\n<p>&nbsp;<\/p>\n<\/td>\n<td id=\"myTextHINT4\" style=\"width: 75%; border:solid 1px; border-color: #000;font-family:Calibri; font-size:14px;\">\n<p style=\"font-family:Calibri; font-size:30px\">&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"myText5\" style=\"width: 25%; border:solid 1px; border-color: #000;text-transform:capitalize;\">\n<p>&nbsp;<\/p>\n<\/td>\n<td id=\"myTextHINT5\" style=\"width: 75%; border:solid 1px; border-color: #000;font-family:Calibri; font-size:14px;\">\n<p style=\"font-family:Calibri; font-size:30px\"><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<button onclick=\"location.reload();\">Randomise the keywords<\/button>\n<button onclick=\"{ var pptx=new PptxGenJS(); pptx.tableToSlides('tableId'); pptx.writeFile(); }\" type=\"button\">\n  Export to PPTX\n<\/button>\n<button onclick=\"change()\">Hide \/ Reveal Keywords<\/button>\n<script>\n\n\nvar KEYWORDS     = [\"anti-malware software\", \"brute force attack\", \"DOS attack\", \"encryption\",\"firewall\",\"hacking\",\"malware\",\"network forensics\",\"network policies\",\"passwords\",\"penetration testing\",\"phishing\",\"social engineering\",\"spyware\",\"Structured Query Language\",\"SQL injection\",\"trojan horse attack\",\"user access levels\",\"virus\"];\nvar HINTS     = [\"A type of computer program which detects, prevents and removes malware on a system\",\"Is an attack that attempts to guess the password to an account by submitting guesses to what the password might be over and over until it gains access\",\"An attack designed to render online services inaccessible. One type of this attack involves many computers simultaneously flooding a target with network traffic\",\"Files that have been altered using a secret code and are unreadable to unauthorised parties\",\"An application or piece of hardware that prevents unauthorised connections to and from the Internet\",\"Gaining unauthorised access to a computer\",\"Software that is designed to cause harm or damage to a computer\",\"Involves monitoring and analysing packets of data in a network to identify where data is going\",\"Provides rules and guidelines on what network users can and cannot do\",\"A collection of characters for user authentication to secure access\",\"Systems are tested for vulnerabilities to reveal any weaknesses in the system which can be fixed\",\"An attempt to gain personal information about someone by way of deception\",\"Refers to using people as the weak point to gain access to systems or gain passwords\",\"Programs that monitor user activities (such as websites visited, usernames and passwords used) and sends the information back to a hacker\",\"It is a programming language used to control databases\",\"Uses a query language to try and gain access to information from a database from a form that is connected to the database\",\"Programs which pretend to be legitimate but in reality are malware\",\"These are the permissions given to a user to access facilities on a computer\",\"Any computer program designed to replicate and damage other computer systems and software\"]\n\n\nvar rannum1 = Math.floor(Math.random() * KEYWORDS.length);\nx = KEYWORDS[rannum1];\nxy = HINTS[rannum1]; \ndocument.getElementById(\"myText1\").innerHTML = x;\ndocument.getElementById(\"myTextHINT1\").innerHTML = xy;\n\nvar rannum2 = Math.floor(Math.random() * KEYWORDS.length);\ny = KEYWORDS[rannum2];\nyy = HINTS[rannum2]; \ndocument.getElementById(\"myText2\").innerHTML = y;\ndocument.getElementById(\"myTextHINT2\").innerHTML = yy;\n\nvar rannum3 = Math.floor(Math.random() * KEYWORDS.length);\nz = KEYWORDS[rannum3];\nzy = HINTS[rannum3]; \ndocument.getElementById(\"myText3\").innerHTML = z;\ndocument.getElementById(\"myTextHINT3\").innerHTML = zy;\n\nvar rannum4 = Math.floor(Math.random() * KEYWORDS.length);\na = KEYWORDS[rannum4];\nay = HINTS[rannum4]; \ndocument.getElementById(\"myText4\").innerHTML = a;\ndocument.getElementById(\"myTextHINT4\").innerHTML = ay;\n\nvar rannum5 = Math.floor(Math.random() * KEYWORDS.length);\nb = KEYWORDS[rannum5];\nby = HINTS[rannum5]; \ndocument.getElementById(\"myText5\").innerHTML = b;\ndocument.getElementById(\"myTextHINT5\").innerHTML = by;\n\nfunction change() {\n   var t = document.getElementById(\"myText1\").innerHTML;\nvar m = document.getElementById(\"myText2\").innerHTML;\nvar n = document.getElementById(\"myText3\").innerHTML;\nvar o = document.getElementById(\"myText4\").innerHTML;\nvar p = document.getElementById(\"myText5\").innerHTML;\n\nif (t === x) {\ndocument.getElementById(\"myText1\").innerHTML = \"\";\n}else{\ndocument.getElementById(\"myText1\").innerHTML = x;\n   } \n\n\nif (m === y) {\ndocument.getElementById(\"myText2\").innerHTML = \"\";\n}else{\ndocument.getElementById(\"myText2\").innerHTML = y;\n   } \n\n\nif (n === z) {\ndocument.getElementById(\"myText3\").innerHTML = \"\";\n}else{\ndocument.getElementById(\"myText3\").innerHTML = z;\n   } \n\n\nif (o === a) {\ndocument.getElementById(\"myText4\").innerHTML = \"\";\n}else{\ndocument.getElementById(\"myText4\").innerHTML = a;\n   } \n\n\nif (p === b) {\ndocument.getElementById(\"myText5\").innerHTML = \"\";\n}else{\ndocument.getElementById(\"myText5\").innerHTML = b;\n   } \n}\n<\/script>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Your randomised keyword starter task is generated below the separator. To produce the answers slide simply click on the &#8216;Export&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2578,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"disable_featured_image":true,"footnotes":""},"class_list":["post-2322","page","type-page","status-publish","has-post-thumbnail","hentry"],"blog_post_layout_featured_media_urls":{"thumbnail":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/09\/undraw_At_work_re_qotl.svg",150,150,true],"full":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/09\/undraw_At_work_re_qotl.svg",811,695,false]},"categories_names":null,"comments_number":"0","_links":{"self":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/2322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/comments?post=2322"}],"version-history":[{"count":1,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/2322\/revisions"}],"predecessor-version":[{"id":2325,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/2322\/revisions\/2325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media\/2578"}],"wp:attachment":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media?parent=2322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}