Photo AI

7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2

Question icon

Question 7

7.1-Name-the-computer-crime-that-has-to-do-with-posting-false-information/-accusations-about-another-person-online-NSC Computer Application Technology-Question 7-2017-Paper 2.png

7.1 Name the computer crime that has to do with posting false information/ accusations about another person online. 7.2 Suggest TWO rules for an acceptable use po... show full transcript

Worked Solution & Example Answer:7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2

Step 1

7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.

96%

114 rated

Answer

The computer crime related to posting false information or accusations about another person online is known as cyberbullying.

Step 2

7.2 Suggest TWO rules for an acceptable use policy (AUP) in a school computer centre that has Internet access.

99%

104 rated

Answer

  1. Users must not visit untrustworthy or offensive websites to maintain a safe online environment.
  2. Users should limit the duration of using ICT resources to ensure equitable access for everyone.

Step 3

7.3 While installing software, you were not required to enter a product key. Give TWO reasons why this occurred.

96%

101 rated

Answer

  1. The software may have been freeware, which does not require a license key for installation.
  2. The software could be pre-activated, meaning it was already licensed and ready for use without the need for additional keys.

Step 4

7.4 A company stores the personal information of its clients. Suggest TWO guidelines for the company to ethically manage client data.

98%

120 rated

Answer

  1. The company must ensure the privacy of data by not selling or sharing user data with third parties.
  2. The company should ensure compliance with the POPI Act (Protection of Personal Information) to protect client information.

Step 5

7.5.1 Identify the type of scam represented in the picture above.

97%

117 rated

Answer

The scam represented in the picture is a form of phishing.

Step 6

7.5.2 State TWO ways in which a user can identify this as a scam.

97%

121 rated

Answer

  1. The website is not HTTPS; therefore, it lacks a secure connection which raises red flags.
  2. The site may have spelling or grammar mistakes in its content, which is often a sign of fraudulent websites.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;