7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Question 7
7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.
7.2 Suggest TWO rules for an acceptable use pol... show full transcript
Worked Solution & Example Answer:7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Step 1
7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The computer crime related to posting false information about another person online is known as cyberbullying.
Step 2
7.2 Suggest TWO rules for an acceptable use policy (AUP) in a school computer centre that has Internet access.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Users should not give out personal information or use others' credentials.
Users should limit the duration of using ICT resources to prevent misuse during peak times.
Step 3
7.3 While installing software, you were not required to enter a product key. Give TWO reasons why this occurred.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The software may be free, potentially being freeware or shareware.
The software could have been pre-activated or bundled with the system, negating the need for a product key.
Step 4
7.4 A company stores the personal information of its clients. Suggest TWO guidelines for the company to ethically manage client data.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The company should ensure the privacy of data and not sell/share user data to third parties.
They must ensure compliance with data protection laws, such as the Protection of Personal Information Act (POPIA).
Step 5
7.5.1 Identify the type of scam represented in the picture above.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Phishing is the type of scam represented in the image, as it involves tricking users into providing sensitive information by imitating a legitimate entity.
Step 6
7.5.2 State TWO ways in which a user can identify this as a scam.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The URL is not associated with a legitimate South African bank, indicating potential fraud.
There may be spelling and grammar mistakes in the text, which are common indicators of phishing attempts.