A user sometimes shares his/her personal details when using social media, e.g - NSC Computer Application Technology - Question 7 - 2018 - Paper 2
Question 7
A user sometimes shares his/her personal details when using social media, e.g. a cellphone number or an e-mail address.
Why should a user think carefully before sha... show full transcript
Worked Solution & Example Answer:A user sometimes shares his/her personal details when using social media, e.g - NSC Computer Application Technology - Question 7 - 2018 - Paper 2
Step 1
Why should a user think carefully before sharing this information on social media websites?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Sharing personal details on social media can expose a user to various risks, including identity theft, where malicious individuals can use that information for fraudulent activities. Additionally, users may fall victim to social engineering attacks, where attackers manipulate individuals into disclosing sensitive information.
Step 2
State TWO ways in which a system administrator can protect a network from hackers.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Implement security policies that include strong passwords and user access controls to prevent unauthorized access.
Install and regularly update antivirus software to detect and mitigate potential threats before they can compromise the network.
Step 3
Why would a research company benefit from using 'big data'?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
'Big data' enables better decision-making, which can lead to reduced costs and increased efficiency. The volume of data gathered offers insights that companies can analyze to improve products and services, making their findings more relevant and beneficial.
Step 4
Explain why you want your friend to use a private browsing mode, such as incognito mode, when he uses your computer to log onto his web-based e-mail service.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Using private browsing mode ensures that your friend's browsing history, cookies, and other personal information are not stored on your computer. This protects his privacy and prevents unauthorized access to his web-based e-mail, maintaining the confidentiality of his information.
Step 5
Explain the BYOD concept. (Do NOT only write out the acronym.)
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The BYOD concept allows learners to use their personal devices, such as tablets, smartphones, and laptops, to connect to the school's network for educational purposes. This fosters a flexible learning environment where students can access resources and complete school-related work from their devices.
Step 6
State TWO problems that this school could experience when implementing a BYOD policy.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Difficulty in controlling data usage, as personal devices may connect to the school network and use significant bandwidth.
Security challenges arise from the variability of devices, as not all learners may have updated security measures on their devices, leaving the network vulnerable to attacks.