1.1.1.1
|
Define ICT.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.1.1.2
|
Describe the brief evolution
of computers.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.1.2.1
|
List the usage of ICT in everyday life.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.1.2.2
|
State the
differences between computerised
and non-computerised systems.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.1.2.3
|
State the impact of ICT
on society.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.1.1
|
Define Computer Ethics, Code of Ethics, Intellectual Property,
Privacy, Computer Crime and Cyber Law.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.1.2
|
Differentiate between ethics and law.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.1.3
|
State the need for intellectual property laws.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.2.1
|
List ways to
protect privacy.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.2.2
|
State authentication and verification technologies :
User
identification, Possessed Object, Biometric device
|
Activity Sheet . doc
Evaluation Sheet . doc
L011
Activity Sheet . pdf
Activity Sheet . doc
Evaluation Sheet . pdf
Evaluation Sheet . doc
L011
Activity Sheet . pdf
Activity Sheet . doc
Evaluation Sheet . pdf
Evaluation Sheet . doc
1.2.3.1
|
List effects of controversial contents on society: Pornography and Slander
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.3.2
|
Describe the process of filtering to control access to
controversial contents.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.4.1
|
Explain the need for Cyber Law.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.2.4.2
|
Explain briefly
the computer crimes: Fraud, Copyright
Infringement, Theft, Attacks
|
Activity Sheet . doc
Evaluation Sheet . doc
1.3.1.1
|
Define computer security.
|
Activity Sheet . doc
Evaluation Sheet . doc
1.3.2.1
|
Explain briefly the different threats to computer security:
*
Malicious code * Hacking *
Natural disaster * Theft
|
Activity Sheet . doc
Evaluation Sheet . doc
1.3.3.1
|
Select the appropriate security measures to overcome the
computer threats
|
Activity Sheet . doc
Evaluation Sheet . doc
1.3.3.2
|
Apply the correct security procedures : Antivirus, Anti-Spyware, Firewall, Data
backup * Cryptography
(Cipher text, Plain text), Human aspects
|
Activity Sheet . doc
Evaluation Sheet . doc
No comments:
Post a Comment