1) a) The information should be accurate. b)People might not be truthful when responding to the questionnaire or the interview, there is a chance that the individuals gathering the data will make mistakes when gathering it, the questions might not be phrased correctly, Interviews might explain the response and ask questions based on previously provided responses. c) User is in contact with the main computer. d) - Visit the website - select a category of goods - add items to your shopping cart or basket - click the "Buy" button - Next, click "Proceed to Checkout," enter your shipping address, and then submit your order - Enter your credit or debit card information - Verify your order 2) Benefit Modules can be used to write programmes. Programmers can divide a large programme into smaller, more manageable modules (object files or libraries) using the linker. Due to the fact that different developers can work on separate modules without influencing each other's code, this modularity encourages code reuse and maintainability. It can also use less RAM, saving money on memory costs. Drawbacks The same variable may be assigned multiple names in various modules or sections of the codebase, which is one of the main concerns with variable names. Developers may find it confusing and challenging to comprehend how variables are used throughout the complete programme as a result of this predicament. When code from various modules interacts with one another, inconsistent naming might potentially cause errors and undesired behaviour. When variable names are not descriptive and unambiguous, the documentation must make up for this intricacy by being more thorough. It is more difficult for other developers (and even the original creator) to grasp the function and usage of each variable when the variable names are unclear. As a result, in-depth explanations or supporting material are required to provide context and understanding. The development team's overall burden may grow as a result of the timeconsuming nature of writing and maintaining thorough documentation. 3) Benefit - Prevent files getting corrupted - Prevent computer from crashing - Prevent computer password from being changed - can select which file or folder to scan Drawbacks - Sometimes it need to pay - Only delete the whole file that is infected or detected - Takes space in storage/harddrive/disk - It needed to be up to date 4) - Data protection and privacy: To safeguard sensitive data and uphold privacy, encryption is required. When data is encrypted, it is changed into an unintelligible format that can only be decoded by authorised people who have access to the encryption key. This guarantees that even if unauthorised people access the data, they will be unable to grasp its contents. - Data Breach Mitigation: Encryption helps to lessen the effects of data breaches. Encrypted data stays unreadable and useless to attackers if it is taken or accessed without authorization, minimising the potential harm brought on by the breach. -Data Storage Security: Data stored on devices like hard drives, laptops, and mobile devices needs to be encrypted. The encrypted data is still inaccessible without the right decryption key in the event that the physical device is misplaced, stolen, or compromised. - Data Integrity: By ensuring that data is unaltered throughout transmission or storage, encryption can also be utilised to protect data. One can confirm the accuracy of the data and find any unauthorised changes by utilising encryption with digital signatures. 5 ai)A light sensor, also known as a photodetector or photosensor, is a device that measures the intensity of light in its surroundings. It converts the light energy into an electrical signal that can be further processed and analyzed by electronic systems.The automatic control of lights is a viable application for a light sensor in a monitoring system. Light sensors can be used to measure ambient light levels in a smart home or workplace setting. The technology can modify the artificial lighting to keep the level of brightness where it should be. When there is enough natural light during the day, the system can reduce or turn off artificial lighting to conserve energy. On the other hand, in darker situations, the system can make the lights brighter to make sure that the occupants have enough light. aii)A temperature sensor is a device that gauges the ambient temperature and transforms it into an electrical signal that electronic systems can understand and use. Climate Control Systems: Temperature sensors are used to keep track of the outside temperature in heating, ventilation, and air conditioning systems. For the system to control the output of heating or cooling and maintain a comfortable temperature for people, this information is important. b One-Point Calibration. - Easiest method to carry out. - Only one point of data is used, making it simple and quick. Two-Point Calibration: - More complex than one-point calibration but still relatively straightforward. - Involves calibrating the sensor at two points within the expected range of values. - Necessary when monitoring a range of values to account for potential nonlinearities. - Requires a linear relationship between sensor readings and the variable being measured, making it unsuitable for curved relationships. Multi-Point Calibration: - The most complex calibration method. - Used for non-linear, multipoint relationships where the sensor response is not linear. - Requires multiple data points to calibrate the sensor accurately. - Greater knowledge of mathematics is needed to analyze and fit the calibration curve. 6. The hacker will send out a fake email to the victim. It uses email to persuade the victim into giving personal information, the hacker can also ask the victim to download to 3rd party app to get the information. The email will look like legitimate but the fact is fake. The email will look like something that will demand the target attention, so the email will have a website URL inviting to go to the site , after opening the link it will take take them to a fake website, and the hacker will ask the victim to enter their personal information such as their bank account. 7. - Some people in developing country don't have a clear address, making it challenging to deliver products ordered online. - Since many people in developing country lack access to broadband, transaction speeds are slower. - Many people in developing countries lack access to banks and credit cards, so they must arrange for someone else to make the purchase on their behalf. - Internet purchases in many developing countries are not protected by consumer protection legislation, leaving buyers defenceless against dishonest vendors. - Power shortages in developing countries might result in a connection being lost throughout the procedure, forcing a retry or losing the sale. 8. a) - A programme that spreads itself across other computers by duplicating itself - does not need to be attached to an already-running programme or file. - They spread out and multiply, taking up more storage. - can alter or delete data, introduce other malicious software, bring backdoors, and so on - A worm takes advantage of weaknesses in systems or networks security b) - The use of a malicious computer program to access a computer - Misleading people about its true purpose/passing itself off as genuine software - Provides the creator with access to control the machine it has infected - They don't try duplicate themselves 9) A format used for storing data, to all users. Both proprietary and open-source software can use an open-source file format. The code can be modified without violating copyright, open source formats are frequently referred to as free file formats. Open source is needed because not everyone can purchase proprietary software and users can work on files in many locations without the need for the same software.