100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Answers

FDEME3L Assignment 2 Distinction Pass

Rating
-
Sold
1
Pages
9
Uploaded on
16-11-2018
Written in
2015/2016

FDEME3L Assignment 2 Distinction Pass










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 16, 2018
Number of pages
9
Written in
2015/2016
Type
Answers
Person
Unknown

Content preview

FDEME3L-02- 556699 Page 1 of 9 C. Thompson - 56068484




FDEME3L
ASSIGNMENT 02
Unique Number:
556699
Due Date: 2015/04/24
First semester: 20 Apr 2015

Christopher
Thompson
Student Number:
56068484




Table of contents

Page Title
1 Cover Page
2-3 Question 1

4 Question 2

5-6 Question 3

7-8 Question 4

8 References

9 Blank page

, FDEME3L-02- 556699 Page 2 of 9 C. Thompson - 56068484


QUESTION 1

1. A) Computer security risk

In this modern age, quick access to digitally stored information provides a solution to the
demands of increased productivity in shorter periods of time. This digital information requires
computer equipment, software, data and information, processing capabilities. Should an event
or action take place which damages any of these four vital components, which could lead to the
loss or damage of information, it is deemed a computer security risk.

Computer viruses are designed to destroy or corrupt data, which spread quickly through
unprotected computers and storage devices. A ‘Worm’ has the potential to permanently damage
hardware by over using computer resources as it copies it’s self rapidly and repeatedly in a
computer’s memory or network. In addition to these threats, a ‘Trojan Horse’ is a malicious
software package, designed to look legitimate, which contains damaging instructions causing a
severe breach in computer security.

An example could include the sending of an email to thousands of computers, with an
attachment containing fake software, claiming to do something good for your computer, such as
increase processing speed, but as recipients of the email opens the email and install the
software, they experience, first hand, a computer security risk.

1. B) Computer literacy

Simply put, computer literacy refers to a knowledge and understanding of what a computer is,
how it works and what are the basic uses of a computer.

Understanding that a computer is an electrical device, operating under control of instructions
stored in its memory that can accept and process data, according to specific rules, to produce
and store results for later use.

Understanding how this is all achieved requires knowledge of both input and output devices
known as hardware, the equipment that makes up the computer. In conjunction to this,
understanding that it is the software that instructs the hardware how to perform specified tasks.
Computers can be used to create newsletters, receipts, pictures, invoices and much more.

1. C) Information literacy

Information literacy is a skill that is developed in numerous areas of a person’s life, not simply
sitting in front of a computer. This term refers to the ability to find and analyse information from
more than one place or source and to then select and organize the information according to the
required needs. Through the development of this skill, people are better equipped to make
decisions accurately and take specific actions based on their findings.

Having a high level of information literacy can assist a person in achieving more actions or
decisions in less time. For example, buying a new car, where different cars could be quickly
compared on the internet. This could also be achieved by visiting several physical locations, car
retail outlets, and comparing them this way.

1. D) Integration literacy

Forming part of a process, integration literacy is the stage at where information is appropriately
matched or allocated to specific task. In the context of a teaching environment, teachers are not

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ChrisThompson University of South Africa (Unisa)
View profile
Follow You need to be logged in order to follow users or courses
Sold
748
Member since
7 year
Number of followers
308
Documents
180
Last sold
1 year ago
Unisa's B'Ed degree - focus on the 14 compulsory educational modules

I completed my B'Ed degree in 2019 and have now started a Honors degree in Inclusive Education. I hope that these study notes will help you succeed as they did me. Apologies for not having them typed out; the reason for this is that I learn and remember more when I write them down by hand. If there is anything I can help you with, please send me a message via Stuvia and I'll get back to you as soon as possible. I wish you all the best with your studies and encourage you to work diligently.

Read more Read less
3,8

16 reviews

5
7
4
2
3
4
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions