0% found this document useful (0 votes)
30 views

CSEC IT MayJune P2 2024 (Answers)

The document outlines various technological tools and practices for students and teachers, including the use of laptops, tablets, and cloud storage. It emphasizes the importance of strong passwords, file encryption, and verifying the authenticity of links to enhance cybersecurity. Additionally, it provides instructions for inserting images and checking for errors in documents, as well as discussing network types and investment calculations.

Uploaded by

Breanna James
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

CSEC IT MayJune P2 2024 (Answers)

The document outlines various technological tools and practices for students and teachers, including the use of laptops, tablets, and cloud storage. It emphasizes the importance of strong passwords, file encryption, and verifying the authenticity of links to enhance cybersecurity. Additionally, it provides instructions for inserting images and checking for errors in documents, as well as discussing network types and investment calculations.

Uploaded by

Breanna James
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

The teachers and students can use laptops and tablets

Projector, Monitor/TV

Cloud storage
Short text

Short text
Number
Number
Student ID

Student ID

Forgein Key

Calculated Query

Grouping gives you the obility to seperate parts of the reports based on

useful groups or categorites that make it easier to read or analyize by


the report reader
1. Strong passwords - The password should have at least 8 characters,

capitals, number and special characters

2. Encrygoten - They can encrypt their files so that even if it is stolen

they cannot be accessed.

1. Check links for autherdity


2. Don't download files from unknow links
Tables

Right Align
1. Click the "insert tab"
2. Choose image
3. Locate the image on the desktop folder
4. Click insert at the correct location

Check for hyperlinks to ensure the items are link to the correct pages or

in the websites

Checks for spelling errors to ensure the information is correct

An opening in a computer system that can be exploited. For exmaple -

weak passwords

Something or someone that can take advantage of a vulnerability.


Eg. A hacker who tries common passwords
A worker from a competing company coming to work and spy on your

business

Flooding a legimate sever with illegitable requests to stop it from spying

on real people OR not being able to acess netflix because the site is
overboard with requets

Stealing data and charging a fee before it can be restroed

Getting a pop up message saying pay 1,000,00 bitcoin to get your data back

A company seeing the database posted on the darkweb

Emails

Text messages
WAN - Wide Area Network

Intrant is private and only internal uses can access it

Extrant is an intrant with special access granted to external users

network administer
modem

server

web page/ internet

switch

web manger
hyperlinks
Initial of investment Initial investment + (initial investment* Return on investment
rate/100) - Initial investment
Rate

Algorithem Investment
Var
II, R, RI
Start
Print 'please enter initial investments'
Read (II)
RI = (II + II*R/100)) - II
Print 'The return is', RI
Stop
Transcription or Transposition

Double Entry - Entering the data twice to ensure they match before
you store / accept it
Visual - Reading over the inputed data aloud to ensure what you put

in the system matches the form

= COUNTIF (B3:B10, "Tennis")


=C3 * D3

If condtion
is true displays this

= IF (B3 > 10, "Yes", "No" if condition is false display that


The function
the computer expects
Condition to check for

Activity

Session Hours , Cost/hour


Circle
Rectangle

Parallelogram for both statements

Diamond

Parallelogram for both statements

Parallelogram
Circle

You might also like