Photo AI

7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2

Question icon

Question 7

7.1-Name-the-computer-crime-that-has-to-do-with-posting-false-information/-accusations-about-another-person-online-NSC Computer Application Technology-Question 7-2017-Paper 2.png

7.1 Name the computer crime that has to do with posting false information/ accusations about another person online. 7.2 Suggest TWO rules for an acceptable use pol... show full transcript

Worked Solution & Example Answer:7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2

Step 1

7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.

96%

114 rated

Answer

The computer crime related to posting false information about another person online is known as cyberbullying.

Step 2

7.2 Suggest TWO rules for an acceptable use policy (AUP) in a school computer centre that has Internet access.

99%

104 rated

Answer

  1. Users should not give out personal information or use others' credentials.
  2. Users should limit the duration of using ICT resources to prevent misuse during peak times.

Step 3

7.3 While installing software, you were not required to enter a product key. Give TWO reasons why this occurred.

96%

101 rated

Answer

  1. The software may be free, potentially being freeware or shareware.
  2. The software could have been pre-activated or bundled with the system, negating the need for a product key.

Step 4

7.4 A company stores the personal information of its clients. Suggest TWO guidelines for the company to ethically manage client data.

98%

120 rated

Answer

  1. The company should ensure the privacy of data and not sell/share user data to third parties.
  2. They must ensure compliance with data protection laws, such as the Protection of Personal Information Act (POPIA).

Step 5

7.5.1 Identify the type of scam represented in the picture above.

97%

117 rated

Answer

Phishing is the type of scam represented in the image, as it involves tricking users into providing sensitive information by imitating a legitimate entity.

Step 6

7.5.2 State TWO ways in which a user can identify this as a scam.

97%

121 rated

Answer

  1. The URL is not associated with a legitimate South African bank, indicating potential fraud.
  2. There may be spelling and grammar mistakes in the text, which are common indicators of phishing attempts.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;