LPM ICTnS

             
1.1.1.1
Define ICT.


Activity Sheet . doc


Evaluation Sheet . doc

1.1.1.2
Describe the brief evolution of computers.


Activity Sheet . doc


Evaluation Sheet . doc

1.1.2.1
List the usage of ICT in everyday life.


Activity Sheet . doc


Evaluation Sheet . doc

1.1.2.2
State the differences between computerised and non-computerised  systems.


Activity Sheet . doc


Evaluation Sheet . doc

1.1.2.3
State the impact of ICT on society.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.1.1

Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.1.2
Differentiate between ethics and law.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.1.3
State the need for intellectual property laws.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.2.1
List ways to protect privacy.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.2.2
State authentication and verification technologies :
User identification, Possessed Object, Biometric device


Activity Sheet . doc


Evaluation Sheet . doc 


L011


Activity Sheet . pdf


Activity Sheet . doc


Evaluation Sheet . pdf


Evaluation Sheet . doc


1.2.3.1
List effects of controversial contents on society: Pornography and Slander


Activity Sheet . doc


Evaluation Sheet . doc

1.2.3.2
Describe the process of filtering to control access to controversial contents.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.4.1
Explain the need for Cyber Law.


Activity Sheet . doc


Evaluation Sheet . doc

1.2.4.2
Explain briefly the computer crimes: Fraud, Copyright Infringement, Theft, Attacks


Activity Sheet . doc


Evaluation Sheet . doc


1.3.1.1
Define computer security.


Activity Sheet . doc


Evaluation Sheet . doc

1.3.2.1
Explain briefly the different threats to computer security:
* Malicious code        * Hacking         *  Natural disaster     *  Theft


Activity Sheet . doc


Evaluation Sheet . doc

1.3.3.1
Select the appropriate security measures to overcome the computer threats


Activity Sheet . doc


Evaluation Sheet . doc

1.3.3.2
Apply the correct security procedures :  Antivirus, Anti-Spyware, Firewall, Data backup    * Cryptography (Cipher text, Plain text), Human aspects


Activity Sheet . doc


Evaluation Sheet . doc


No comments:

Post a Comment