7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Question 7
7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.
7.2 Suggest TWO rules for an acceptable use po... show full transcript
Worked Solution & Example Answer:7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Step 1
7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The computer crime related to posting false information or accusations about another person online is known as cyberbullying.
Step 2
7.2 Suggest TWO rules for an acceptable use policy (AUP) in a school computer centre that has Internet access.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Users must not visit untrustworthy or offensive websites to maintain a safe online environment.
Users should limit the duration of using ICT resources to ensure equitable access for everyone.
Step 3
7.3 While installing software, you were not required to enter a product key. Give TWO reasons why this occurred.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The software may have been freeware, which does not require a license key for installation.
The software could be pre-activated, meaning it was already licensed and ready for use without the need for additional keys.
Step 4
7.4 A company stores the personal information of its clients. Suggest TWO guidelines for the company to ethically manage client data.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The company must ensure the privacy of data by not selling or sharing user data with third parties.
The company should ensure compliance with the POPI Act (Protection of Personal Information) to protect client information.
Step 5
7.5.1 Identify the type of scam represented in the picture above.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The scam represented in the picture is a form of phishing.
Step 6
7.5.2 State TWO ways in which a user can identify this as a scam.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The website is not HTTPS; therefore, it lacks a secure connection which raises red flags.
The site may have spelling or grammar mistakes in its content, which is often a sign of fraudulent websites.