Professional Documents
Culture Documents
(36 mark)
.
1. Figure 1 shows several generations of computer technology.
A B C
A Computer fraud
B Computer theft
C Computer attack
Table 1
Based on Table 1, write A, B or C to categories the following activities:
DATA INFORMATION
ICT COMMUNICATION
C
Words, names, symbols, devices and images
that represent products, goods or services
A
The features of, in particular, the lines,
contours, colors ,shape, texture or material
of the product itself or its ornamentation. B
D
ii) Literary and artistic material, music, films, sound recordings and roadcasts,
including software and multimedia.
12. The usage of ICT technologies such as to create pornographic web sites can have a
negative impact on society.
13. Cyber law is a system of moral standards or values used as a guideline for
computer users.
15. A firewall permits limited access to unauthorised users or any activities from the
network environment
16. In presentation should contain three well-defined sections Introduction, Content and
Conclusion.
17. Virus a program that can pass on the malicious code to other programs by modifying
them.
18. Site blocking is a process that prevents or blocks access to certain materials on the
Internet.
21. .____________ are used to identify users by web casting, ecommerce and other web
applications.
22. ____________ is privacy threat which is obtained by a form such as magazine
subscription or product warranty cards that had been filled by online subscribers.A
__________________ refers to a program that collects user information without the
user’s knowledge.
23. ____________ Oral communication of false statements and malicious statement
or report about someone to injurious to a person's reputation.
25. _____________ includes virus, Trojan horse, logic door, trapdoor and backdoor, and
many others. A ____________ is a program that copies and spreads itself through a
network. Example of a antivirus is _______________.
SECTION B
Question 1.
a. What is ethics?
________________________________________________________________
b. State the differences between ethics and law. Fill in the box with the correct answer.
ETHICS LAW
[2 marks]
Question 2
Technology A
a. Name the technology A. ( 1 mark)
A is: ____________________________________________________________
b. Technology A is one of two mehod used in _______________________.(1 mark)
Question 2
.
a. What is computer crime ? [2 mark ]
Question 4
a) Give two method commonly use in verification. [2 marks]
i)_____________________________________________________________________
ii)_____________________________________________________________________
ii)_____________________________________________________________________
Question 5
a) State two negative impacts of Internet on the society. [2 marks]
i)_____________________________________________________________________
ii)_____________________________________________________________________
b) State two positive impacts of Internet on the society. [2 marks]
i)____________________________________________________________________
ii)_____________________________________________________________________
SECTION C
____________________________________________________________
ii)
________________________________________________________________
c) Give two preferred method of choice to limit access on the internet to filter
pornography content. [2 marks]
i) _________________________________________
ii) _________________________________________