0% found this document useful (0 votes)
62 views17 pages

CSEC - Information - Technology - P2 - 2021 Answered

The document discusses computer security and threats from malicious code or people both internally and externally. It provides examples of internal and external threats and methods to protect against them like access control, passwords, protecting hardware/software, and protecting communications. It also discusses identity theft and tips to prevent it like using chip cards and storing data securely.

Uploaded by

Ajay Goberdhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views17 pages

CSEC - Information - Technology - P2 - 2021 Answered

The document discusses computer security and threats from malicious code or people both internally and externally. It provides examples of internal and external threats and methods to protect against them like access control, passwords, protecting hardware/software, and protecting communications. It also discusses identity theft and tips to prevent it like using chip cards and storing data securely.

Uploaded by

Ajay Goberdhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Refers to when a computer is succeptible to a threat or attach form malicious code

or people.

External

Internal

Internal

External

Access control- allowing them to only access certain files

Passwords- giving each user a username & password.


Computer- is protecting the hardware and software

Cyber- protecting the communications

Identity Theft

Use chip cards that have higher security

Store data in a password protected place


Click on the row at the bottom in datasheet view

Type in all the fields until done

Failed a validation check

Put in the correct data type


2

1
4

7
14
False
True
True
False
False
True

System software runs in the background and ensures the


computer works properly.

Application runs in the foreground and the users interact with


it most

Touchscreen
Input- Process- Storage- Output

manual
direct
manual
direct
Hyper Link

This is to ensure that the links works properly and


leads the user to the correct page.
Centre
Font colour

Columns, landscape

File save as, save with a new name

Auto save
Password protect
WAN

Wired
Wireless
Wired
Wireless
Highlight D1:E11, Select pivot chart
Choose columns Days & Number of students

=AVERAGE (E2:E11)

= IF E2 > 30

Use fill handle by clicking on the notch on the bottom right

hand side and dragging down until F11


Number
Product

Value

Loop, Repition, Iteration


2- average should be a float
6- average should be divided by 5
7- output/print
7- print out average not product
6- selection1 + selection2

Algorithm to find average

variables

a,b,c,sum,average

Start

get(a,b,c)

sum= (a+b+c)

average= Sum/3

print "average"

Stop
Super Computer

Mainframe
Desktop

Monitor

System Unit

Input / Storage

Input

Input
Webcam - it captures video

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy