7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Question 7
7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.
7.2 Suggest TWO rules for an acceptable use poli... show full transcript
Worked Solution & Example Answer:7.1 Name the computer crime that has to do with posting false information/ accusations about another person online - NSC Computer Application Technology - Question 7 - 2017 - Paper 2
Step 1
7.1 Name the computer crime that has to do with posting false information/ accusations about another person online.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The computer crime related to posting false information or accusations about another person online is known as cyberbullying.
Step 2
7.2 Suggest TWO rules for an acceptable use policy (AUP) in a school computer centre that has Internet access.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Do not give out personal information: Users should not share personal details or private data that could jeopardize their safety or privacy.
Limit usage to educational purposes: The computer resources should primarily be used for school-related activities and not for personal or recreational use.
Step 3
7.3 While installing software, you were not required to enter a product key. Give TWO reasons why this occurred.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The software may be free or open-source: Some software is available for free without requiring a license key, making it accessible to all users.
Pre-activated enterprise software: The software might have been pre-activated by the institution, meaning that it does not require an additional product key for installation.
Step 4
7.4 Suggest TWO guidelines for the company to ethically manage client data.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Ensure privacy of data: The company should protect user data and should not sell or share it with third parties without explicit consent.
Implement strong data protection measures: The company should take precautions against data breaches by encrypting sensitive information and regularly updating their security protocols.
Step 5
7.5.1 Identify the type of scam represented in the picture above.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of scam represented in the picture is phishing.
Step 6
7.5.2 State TWO ways in which a user can identify this as a scam.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Incorrect URL: The website's URL does not match that of a legitimate bank, which is a common indicator of phishing attempts.
Urgency and spelling errors: The message uses urgency (e.g., "URGENTLY updated you deteil") and contains spelling mistakes, which are red flags for fraudulent communications.