1.- What are the main risks if someone is using our wifi, without our permission?

-They can prevent the connection of our equipment.-An inappropriate configuration of our wireless network can allow an attacker to steal the information we transmit.

-Direct connection to our devices. An intruder with sufficient knowledge could access computers connected to the network, which would involve giving you access to all of our information.

-Responsibility for illegal actions.

2.- a) How can we detect if an intruder is using our wifi? Explain, at least, two

different methods. Turn off all our equipment and check the flickering lights on the router. If they continue to blink, other people may be using our connection without our consent.

We can check the status of our network.

b) How can we protect our wifi? What are the main measures we must take?

The router must incorporate at least the WPA protocol among its security measures. If it is prior to this security option we must replace it. In order to know which protocol is used, the first thing to do is to access the configuration of our router.

Safety measures:

-Assign the most advanced security system: WPA2..

-Change the default password. We must establish a password to access the WiFi network of at least 12 characters with uppercase, lowercase, numbers and symbols.

-Change the name of the WiFi or SSID.

-Modify the password to change the settings.

-Turn it off if we’re away for several days. If we’re not going to be at home and we don’t need the WiFi connection, it’s best to turn off the router.

3.- a) What are the main ways in which viruses can enter our electronic devices?

-External storage devices (USB sticks, hard disks, memory cards, etc. );Infection via USB devices is mainly performed by copying infected files from a USB to our computer. Sometimes simply connecting a USB stick containing a virus to your computer can cause you to become infected, as some viruses have the ability to self-execute.

-Downloading Files; When opening or executing files downloaded from the Internet (programs, multimedia content, documents, etc. ) it is necessary to be cautious since they can bring camouflaged some type of malware.

-Malicious websites; Some web pages are prepared to infect the user who visits them by taking advantage of the security problems of a non-updated browser or of the installed plug-ins: Java, Flash, etc.

-Social Networking; Social networks are also used to infect devices due to the large number of users that frequent them and the high degree of propagation.

-Vulnerabilities / Security breaches; A vulnerability is a security flaw or problem with a program, application, plugin, or operating system. They are often used by cybercriminals to infect computers.

b) Say at least three different ways in which viruses can attack our information, and which is the goal in all of them.

-Encryption and / or deletion of information: In these cases it may be difficult or impossible :to recover such information unless we have a backup copy.

-Data theft: In the event of theft of information, the implications may lead to loss of information. privacy, identity theft, commission of crimes on our behalf or economic losses.

-Identity theft: If we have been the victims of information theft, we can suffer an identity theft both in the digital life and in the physical world.

-Economic losses: Sometimes a virus is able to access our banking data, information that allows cyber criminals to buy products online, make transfers or even duplicate the card to be used in physical stores.4.- Explain at least three measures we must implement to protect from viruses, with details. -Firewall: It is very important to have installed and enabled a firewall that does not allow incoming connections to our computer by other network users. -Antivirus system: Some antivirus applications can not only identify and stop malicious software intended for our computer, but also detect and block attempts to attack our terminal.-Configurations: two configurations. “Publicis what we must select in other people’s networks, andPrivate is what we must use in networks of total trust, such as that of our home or work. 5.- a) Explain the three types of users that operating systems normally distinguish to use in the devices. What is each one designed for? Types of user accounts:

-Admin user: To be able to manage the user accounts of a computer, create them, eliminate them or change their characteristics it is necessary that there is a special user with permissions to manage them. Only users of this type can install applications on the computer or modify important aspects of the configuration, such as Internet connections.

-Administrator user account, to configure it and manage the rest of user accounts that will be those of normal users, standard users, for the daily use of the computer.

-The guest user that serves so that users without a personal account can log in and use the computer on time. b) Do operating systems normally give parents and teachers possibilities to control the use of the computers their underage children do? How? Child protection. Windows allows you to configure a user account to be used by a minor to limit the time you can use the computer, control the games you can use and allow or block the specific use of the applications installed on the computer. In addition, through Child Protection (this functionality is known), parents can monitor and / or set limits to the child’s browsing on the Internet:• Narrow the type of web pages that the minor can visit,• Authorize or block access to specific web pages.Obtain a report of the minor’s activity on the web.6.- a) Why installing updates is so important to be protected from viruses? It is important to install actualizations to remove any problem that can happen with our  apps. and in that way to protect us from any unauthorized entry. b) What programs are the most important to be updated, not to lose important information? Antivirus, Security Updates, Backups, Limitation of user permissions, Personal firewall.7.- With our mobile phones, what security measures must we implement to protect our information?

-Install an antivirus. Malware doesn’t just affect computers. Some apps are designed to infect smartphones and tablets.

-Watch out for the scams. The increased use of mobile devices by users has increased the number of fraud attempts through this channel. Stay alert.

-Protect your mobile so that in case of theft or loss you can recover it or at least prevent others from accessing your information.

-Caution when connecting to public wifi and other devices via Bluetooth.

It avoids cancelling the manufacturer’s restrictions. These are designed to make your device work properly without safety risks.

-If your mobile device is Android, you can install CONAN mobile that allows you to know the security status of your device.

8.- a) Explain three ideas that should make you suspect form a mail of electronic

banking. How is this fraud called?

-If he doesn’t identify himself or doesn’t do it correctly. If you only offer the e-mail or mobile number as the only way to contact.

-If the price is far below market value, it is probably a fake product or a scam.

-If they ask you for money up front.


b) Explain the advantages and disadvantages of these three methods to pay in

Internet: credit card, bank transfer, payment platform.

-Credit or debit card. Using cards for payment is convenient and quick, as it is done with the information contained in the card itself, is immediate and can be very secure. However, it is not the best method if we have any doubt about the reliability of the website, as we are providing all the information necessary to make purchases.

-Bank transfer. In this type of payment the money is sent from our bank account directly to the seller’s account. The main advantage is that no data is entered on any website. However, if the account is in a foreign country, it can be difficult to recover the money in the event of fraud, since it is a movement of money between two bank accounts.

These are independent services that act as intermediaries between us and the seller. The most widely used is PayPal.

-The main advantage of these platforms is that the owner of the store does not have access to our credit card data, in addition these entities regulate the collections and payments, acting as mediators in errors and possible frauds. However, since we are going to provide these platforms with our bank details (card or account), we must inform ourselves of the security measures and what guarantees they offer in the event of fraud.

9.- Explain three important ideas to take into account when publishing personal

information in social networks.

-Properly configure the privacy of your profile.

-Think before you publish something, because once published you don’t know if it will come out of the social network. They’ll be able to use that information against you.

-Do not share photos or videos in which you appear in compromised situations (sexting).

10.- a) What are the cookies? Cookies are small files that are saved on your computer when you browse and that store information about the sites you visit, preferences and other personal information.

b) What does it mean to have your browser kidnapped? How can you realize it is? What do people do these things for? What are they looking for? How?

Having your browse kidnapped means that after a security problem someone has accessed our information or has taken control of our browser. They do it to access everything we do, how we behave, etc. If we haven’t closed the session of an app or social network, they can access them and obtain a lot of information. They are looking for information and bayme money. If they can access our passwords, they can get a lot of things from us.

11.- What is a person’s digital identity? Can it be important to realize what is yours? Why? A digital identity is any information published on the Internet about a specific person. These are data that may have been published by the person himself and also data that may have ended up on the net for other reasons: they have been published by another person, a newspaper, a school, etc.

Yes, because we must learn to value and protect our information because once it is published on the Internet we lose control of it. The information we publish on the Internet may turn against us or be used to harm us. 12.- Explain how is the best way to do a backup of your information. What must you save, where, how often, etc ?

On external disks connected via USB. This is the most recommended way to perform backups. The large capacity of today’s devices allows us to store all of our valuable files. It can be manual or automatic. You must save the information that you consider important frequently in a different device from the original.  

13.- What is cloud computing? Explain its advantages and disadvantages, and put some examples of applications that use it.

Cloud computing is a technology that allows remote access to software, file storage and data processing via the Internet, thus being an alternative to running on a personal computer or local server.

Advantages: Cost Savings, Reliability, Manageability, Strategic Edge

Disadvantages: Downtime, Security, Vendor Lock-In, Limited Control

Example: iCloud

14.- a) In Computer Science, what do we call data, information and knowledge?

Explain the differences between them.

Data is words, numbers, dates, images, sounds etc without context.

Information is a collection of words, numbers, dates, images, sounds etc put into contextto give them meaning.

Knowledge is the ability to understand information and to then form judgements, opinions, make predictions and decisions based on that understanding.

b) What is an expert system? Expert systems. This is where computers are programmed to accept a large number of items of information and, based on rules set in the program, make decisions, then further decisions. The best-known examples of these are automatic pilots in airplanes and diagnosis applications used to help doctors.

15.- Explain what is the difference between a standard format of a file and a private one? Put some examples with images, videos, text …images: jpg; video:mp4; private: online

-When a video or file is public, it puts MP4, and can be opened with more than one program.

-Instead, when it is private, it puts movie Maker for example, and this means that you can only open with a single program, which in this case would be the movie Maker.

16.- Explain these three types of malware by email: hoax, spam, scam. Kahoot: tests.

-A hoax is a falsehood deliberately fabricated to masquerade as the truth. It is distinguishable from errors in observation or judgment, rumors, urban legends…

-Spam: Unsolicited e-mail that is sent to a large number of recipients for advertising or commercial purposes.

-Scam: an illegal plan for making money, especially one that involves tricking people

1.- Digital identity is

2.- If there is something published digitally that harms you …

3.- If you are going to make a very big backup, with a lot of information, the most

suitable option would be

4.- One of the most dangerous frauds in Internet is:

5.- These are the most common paying methods in Internet: