100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
FDEME3L Assignment 2 Distinction Pass R80,00
Add to cart

Answers

FDEME3L Assignment 2 Distinction Pass

 188 views  1 purchase

FDEME3L Assignment 2 Distinction Pass

Preview 2 out of 9  pages

  • November 16, 2018
  • 9
  • 2015/2016
  • Answers
  • Unknown
All documents for this subject (25)
avatar-seller
ChrisThompson
FDEME3L-02- 556699 Page 1 of 9 C. Thompson - 56068484




FDEME3L
ASSIGNMENT 02
Unique Number:
556699
Due Date: 2015/04/24
First semester: 20 Apr 2015

Christopher
Thompson
Student Number:
56068484




Table of contents

Page Title
1 Cover Page
2-3 Question 1

4 Question 2

5-6 Question 3

7-8 Question 4

8 References

9 Blank page

, FDEME3L-02- 556699 Page 2 of 9 C. Thompson - 56068484


QUESTION 1

1. A) Computer security risk

In this modern age, quick access to digitally stored information provides a solution to the
demands of increased productivity in shorter periods of time. This digital information requires
computer equipment, software, data and information, processing capabilities. Should an event
or action take place which damages any of these four vital components, which could lead to the
loss or damage of information, it is deemed a computer security risk.

Computer viruses are designed to destroy or corrupt data, which spread quickly through
unprotected computers and storage devices. A ‘Worm’ has the potential to permanently damage
hardware by over using computer resources as it copies it’s self rapidly and repeatedly in a
computer’s memory or network. In addition to these threats, a ‘Trojan Horse’ is a malicious
software package, designed to look legitimate, which contains damaging instructions causing a
severe breach in computer security.

An example could include the sending of an email to thousands of computers, with an
attachment containing fake software, claiming to do something good for your computer, such as
increase processing speed, but as recipients of the email opens the email and install the
software, they experience, first hand, a computer security risk.

1. B) Computer literacy

Simply put, computer literacy refers to a knowledge and understanding of what a computer is,
how it works and what are the basic uses of a computer.

Understanding that a computer is an electrical device, operating under control of instructions
stored in its memory that can accept and process data, according to specific rules, to produce
and store results for later use.

Understanding how this is all achieved requires knowledge of both input and output devices
known as hardware, the equipment that makes up the computer. In conjunction to this,
understanding that it is the software that instructs the hardware how to perform specified tasks.
Computers can be used to create newsletters, receipts, pictures, invoices and much more.

1. C) Information literacy

Information literacy is a skill that is developed in numerous areas of a person’s life, not simply
sitting in front of a computer. This term refers to the ability to find and analyse information from
more than one place or source and to then select and organize the information according to the
required needs. Through the development of this skill, people are better equipped to make
decisions accurately and take specific actions based on their findings.

Having a high level of information literacy can assist a person in achieving more actions or
decisions in less time. For example, buying a new car, where different cars could be quickly
compared on the internet. This could also be achieved by visiting several physical locations, car
retail outlets, and comparing them this way.

1. D) Integration literacy

Forming part of a process, integration literacy is the stage at where information is appropriately
matched or allocated to specific task. In the context of a teaching environment, teachers are not

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ChrisThompson. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R80,00. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

51683 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 15 years now

Start selling
R80,00  1x  sold
  • (0)
Add to cart
Added