What are emerging - TopicsExpress



          

What are emerging technologies? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Describe the following. Artificial intelligence ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Digital forensics ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest five benefits and five limitations of emerging technology. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What are SMEs? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Why are SMEs important? Give three reasons ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… How do SMEs use ICT? State four ways ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… How Has the Knowledge-Based Economy Impacted SMEs? State three reasons ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What Types of Advanced ICT Products are SMEs Starting to Use? Give any four ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest any five major Products of Advanced Information Technology SMEs have adopted. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Why Should SMEs Adopt ICT? Mention any three reasons ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline four benefits of ICT Tools for SMEs ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Why Have So Few SMEs Adopted ICT? Explain any five reasons ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Why Have Past Government Interventions Been Met with Limited Success with regards use of ICTs in SMEs? Outline four reasons ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… System security, ICT ethical issues and emerging technologies Describe the concept of system security ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between data security and data corruption ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is a computer security risk? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between a computer crime and a cyber crime ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline any four computer security risks ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define the term computer virus ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Why do people create computer viruses? Give four reasons ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Write down two tasks carried out by a computer virus ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Mention three basic ways of activating computer viruses ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest four ways through which computer viruses are spread. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Explain any ten types of computer viruses ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline two risks posed by viruses ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Give five sources of computer viruses ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Mention six symptoms of computer viruses ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… State six ways through which computers can be protected from computer viruses ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is a virus signature/definition? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define the term antivirus program ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Mention three examples of antivirus programs ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between unauthorized access and unauthorized use of computer systems ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… State two forms of unauthorized access of computer systems ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline two forms of unauthorized use of computer systems ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest four control measures against unauthorized access to computer systems ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Access control is normally implemented using a two phase process. Explain the two phases. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Describe the following methods of identification and authentication. Usernames and passwords ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Possessed objects ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Callback systems ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Biometric devices ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… List down two tips for safeguarding your password ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Write short notes on any five biometric devices ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline one advantage and four disadvantages of biometric devices ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between a hacker and hacking ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… How can hacking be prevented? Give four ways ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is a denial of service attack (DOS)? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… How can a denial of service attack be undertaken? Give two ways ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between cracking and spoofing ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is the difference between hardware theft and hardware vandalism? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest five precautions that can be undertaken to prevent hardware theft. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define software theft ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Give two forms of software theft ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is information theft? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… State two reasons as to why information is stolen ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Give three ways through which theft of information and software can be prevented. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define system failure ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Give three causes of system failure ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline three effects of system failure ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Give three ways of preventing system failure ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest three measures that can be undertaken to protect computers against electrical power disturbances ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Identify any three possible threats to a computer network. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is a backup? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Describe the following types of backup Full backup ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differential backup ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Incremental backup ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define the term malware ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest three ways through which malware can enter into your computer ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Identify three examples of malware ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between phishing and pharming ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is a firewall? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… How does a firewall protect your computer? Give four ways ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between a hardware firewall and software firewall ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Mention three advantages and three disadvantages of a hardware firewall ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Explain any three advantages and three disadvantages of a software firewall ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is data encryption? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between plain text and cipher text ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is the difference between public key encryption and symmetric encryption? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Give two advantages and two disadvantages of public key encryption ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Identify two advantages and two disadvantages of symmetric encryption ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest three physical barriers used to protect computers. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between an audit trail and access controls. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline any five health risks associated with prolonged computer use. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Identify five precautions that can be undertaken to prevent health risks ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is ergonomics as used under computer security? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What does EMR stand for? ……………………………………………………………………………………………………… What are computer ethics? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest five areas of computer ethics ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is software piracy? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest two reasons why software piracy continues. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Identify three negative effects of software piracy ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… How can software piracy be reduced? State any four ways ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define the term license agreement ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Describe the following terms Single-user agreement ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Site license ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Network site license ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What does a single user agreement allow a user to do? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What does a single user agreement deter a user to do? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define information privacy ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What kind of information can infringe on information privacy? State any four. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest four forms of privacy violations ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What is information accuracy? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Define intellectual property rights ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between copyright and trademark ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest eight reasons as to why the copyright law is needed in the modern computer era. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Describe the concept of codes of conduct ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Outline any eight codes of conduct users must follow ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Explain the following electrical power variations. Noise ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Under voltage ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Over voltage ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Differentiate between brownout and blackout ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Explain the concept of careers in ICT ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Explain three kinds of tasks undertaken by the following. Database administrator ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Software engineer ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… System analyst ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Information system manager ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Computer engineer ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Computer programmer ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Computer technician ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Webmaster ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Computer trainer ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Computer operator ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… What are emerging technologies? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Describe the following. Artificial intelligence ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Digital forensics ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… Suggest five benefits and five limitations of emerging technology. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………………………………………………………………………………………………………
Posted on: Thu, 05 Sep 2013 15:27:10 +0000

Trending Topics



Recently Viewed Topics




© 2015