{"id":843,"date":"2020-05-05T13:31:20","date_gmt":"2020-05-05T13:31:20","guid":{"rendered":"https:\/\/computerscienced.co.uk\/site\/?page_id=843"},"modified":"2021-10-06T21:00:11","modified_gmt":"2021-10-06T21:00:11","slug":"ks4-keyword-scramble-ocr-1-6-system-security","status":"publish","type":"page","link":"https:\/\/computerscienced.co.uk\/site\/ks4-keyword-scramble-ocr-1-6-system-security\/","title":{"rendered":"KS4 Keyword Scramble OCR 1.4 Network security"},"content":{"rendered":"\n<p>Unscramble the keyword below relating to Computer Science:<\/p>\n\n\n\n<body onload=\"displayscrambledword()\">\n<style>\n#myDIV {\n  width: 100%;\n  padding: 5px 0;\n  text-align: left;\n  background-color: green;\n  color: white;\n  margin-top: 5px;\ndisplay: none;\n}\n#myDIVwrong {\n  width: 100%;\n  padding: 5px 0;\n  text-align: left;\n  background-color: red;\n  color: white;\n  margin-top: 5px;\ndisplay: none;\n}\n#myDIVHelp {\n  width: 100%;\n  padding: 5px 0;\n  text-align: left;\n  background-color: #0073aa;\n  color: white;\n  margin-top: 5px;\ndisplay: none;\n}\n.tg  {border-collapse:collapse;border-spacing:0;}\n.tg td{font-family:Arial, sans-serif;font-size:18px;padding:20px 20px;border-style:solid;border-width:1px;overflow:hidden;word-break:normal;border-color:black;}\n.tg th{font-family:Arial, sans-serif;font-size:18px;font-weight:normal;padding:20px 20px;border-style:solid;border-width:1px;overflow:hidden;word-break:normal;border-color:black;}\n.tg .tg-1wig{font-weight:bold;background-color:#9b9b9b;text-align:left;vertical-align:top}\n.tg .tg-0lax{text-align:left;vertical-align:top}\n<\/style>\n<script>\n\n\/\/New Scramble begin\nString.prototype.shuffle = function () {\n    var a = this.split(\"\"),\n        n = a.length;\n    \n    for (var i = n - 1; i > 0; i--) {\n        var j = Math.floor(Math.random() * (i + 1));\n        var tmp = a[i];\n        a[i] = a[j];\n        a[j] = tmp;\n    }\n    return a.join(\"\");\n}\n\/\/New Scramble END\nfunction displayscrambledword(){\nvar xx = document.getElementById(\"myDIV\");\n    xx.style.display = \"none\";\nvar xxy = document.getElementById(\"myDIVHelp\");\n    xxy.style.display = \"none\";\nvar y = document.getElementById(\"myDIVwrong\");\n    y.style.display = \"none\";\n\/\/var z = document.getElementById(\"myDIVhelp\");\n \/\/   z.style.display = \"none\";\n\n\nvar KEYWORDS     = [\"anti-malware software\", \"brute force attack\", \"DOS attack\", \"encryption\",\"firewall\",\"hacking\",\"malware\",\"network forensics\",\"network policies\",\"passwords\",\"penetration testing\",\"phishing\",\"social engineering\",\"spyware\",\"Structured Query Language\",\"SQL injection\",\"trojan horse attack\",\"user access levels\",\"virus\"];\nvar HINTS     = [\"A type of computer program which detects, prevents and removes malware on a system\",\"Is an attack that attempts to guess the password to an account by submitting guesses to what the password might be over and over until it gains access\",\"An attack designed to render online services inaccessible. One type of this attack involves many computers simultaneously flooding a target with network traffic\",\"Files that have been altered using a secret code and are unreadable to unauthorised parties\",\"An application or piece of hardware that prevents unauthorised connections to and from the Internet\",\"Gaining unauthorised access to a computer\",\"Software that is designed to cause harm or damage to a computer\",\"Involves monitoring and analysing packets of data in a network to identify where data is going\",\"Provides rules and guidelines on what network users can and cannot do\",\"A collection of characters for user authentication to secure access\",\"Systems are tested for vulnerabilities to reveal any weaknesses in the system which can be fixed\",\"An attempt to gain personal information about someone by way of deception\",\"Refers to using people as the weak point to gain access to systems or gain passwords\",\"Programs that monitor user activities (such as websites visited, usernames and passwords used) and sends the information back to a hacker\",\"It is a programming language used to control databases\",\"Uses a query language to try and gain access to information from a database from a form that is connected to the database\",\"Programs which pretend to be legitimate but in reality are malware\",\"These are the permissions given to a user to access facilities on a computer\",\"Any computer program designed to replicate and damage other computer systems and software\"]\n\nvar rannum = Math.floor(Math.random() * KEYWORDS.length);\n\nx = KEYWORDS[rannum];\nxy = HINTS[rannum];\n\ndocument.getElementById(\"myText2\").innerHTML = x;\ndocument.getElementById(\"myTextHINT\").innerHTML = xy;\ndocument.getElementById(\"myText\").innerHTML = x.split(' ').map(function(w) { return w.shuffle(); }).join(' ');\n}\nfunction myFunctionHelp(){\n var xxy = document.getElementById(\"myDIVHelp\");\n  if (xxy.style.display === \"block\") {\n    xxy.style.display = \"none\";\n  } else {\n    xxy.style.display = \"block\";\n  }\n}\n\nfunction myFunction(){\nvar userInput = document.getElementById(\"unscramble\").value;\nif (userInput == x) {\n var xx = document.getElementById(\"myDIV\");\n  if (xx.style.display === \"block\") {\n    xx.style.display = \"none\";\n  } else {\n    xx.style.display = \"block\";\n  }\n}else{\nvar y = document.getElementById(\"myDIVwrong\");\n  if (y.style.display === \"block\") {\n    y.style.display = \"none\";\n  } else {\n  y.style.display = \"block\";\n  }\n}\n}\n<\/script>\n<div id=\"myDIVHelp\" onclick=\"myFunctionHelp()\">\n<h4>Help<\/h4>\nTry to move the letters around to find the correct keyword word. The keyword will be from the OCR GCSE J277 specification section 1.4 and will be about network security.  <br>It may help by writing them out on a piece of paper and try to change the order or write the letters in a circle to help you figure it out. <br>\n<b>Remember<\/b> that if there are capital letters in the scrambled word you must use these in your answer to get the question correct.      \n<h4>Hint<\/h4>\nThis is the explanation of the keyword if you are struggling!<br>\n<p><b><span id=\"myTextHINT\"><\/span><\/b><\/p> \n<\/div>\n<h2><span id=\"myText\"><\/span><\/h2>\n<input type=\"text\" size=\"35\" id=\"unscramble\" onfocus=\"this.value=''\" >\n<button onclick=\"myFunction()\">Submit your answer<\/button>\n<button onclick=\"displayscrambledword()\">Try another<\/button>\n<button onclick=\"myFunctionHelp()\">Hint<\/button>\n<div id=\"myDIV\">\n<h3>That is right!<\/h3>\n<h4>The right answer is <span id=\"myText2\"><\/span><\/h4>\n<\/div>\n\n<div id=\"myDIVwrong\">\n<h3>That is not correct<\/h3>\n<h4>Have you spelled it correctly and put in capital letters?<\/h4>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Unscramble the keyword below relating to Computer Science: Help Try to move the letters around to find the correct keyword&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2745,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"disable_featured_image":true,"footnotes":""},"class_list":["post-843","page","type-page","status-publish","has-post-thumbnail","hentry"],"blog_post_layout_featured_media_urls":{"thumbnail":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/10\/undraw_Sync_re_492g-1.svg",150,150,true],"full":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/10\/undraw_Sync_re_492g-1.svg",1058,747,false]},"categories_names":null,"comments_number":"0","_links":{"self":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/comments?post=843"}],"version-history":[{"count":5,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/843\/revisions"}],"predecessor-version":[{"id":1938,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/843\/revisions\/1938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media\/2745"}],"wp:attachment":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media?parent=843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}