100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4.2 TrustPilot
logo-home
Antworten

FDEME3L Assignment 2 Distinction Pass

Bewertung
-
Verkauft
1
seiten
9
Hochgeladen auf
16-11-2018
geschrieben in
2015/2016

FDEME3L Assignment 2 Distinction Pass

Hochschule
Kurs









Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Schule, Studium & Fach

Hochschule
Kurs

Dokument Information

Hochgeladen auf
16. november 2018
Anzahl der Seiten
9
geschrieben in
2015/2016
Typ
Antworten
Person
Unbekannt

Themen

Inhaltsvorschau

FDEME3L-02- 556699 Page 1 of 9 C. Thompson - 56068484




FDEME3L
ASSIGNMENT 02
Unique Number:
556699
Due Date: 2015/04/24
First semester: 20 Apr 2015

Christopher
Thompson
Student Number:
56068484




Table of contents

Page Title
1 Cover Page
2-3 Question 1

4 Question 2

5-6 Question 3

7-8 Question 4

8 References

9 Blank page

, FDEME3L-02- 556699 Page 2 of 9 C. Thompson - 56068484


QUESTION 1

1. A) Computer security risk

In this modern age, quick access to digitally stored information provides a solution to the
demands of increased productivity in shorter periods of time. This digital information requires
computer equipment, software, data and information, processing capabilities. Should an event
or action take place which damages any of these four vital components, which could lead to the
loss or damage of information, it is deemed a computer security risk.

Computer viruses are designed to destroy or corrupt data, which spread quickly through
unprotected computers and storage devices. A ‘Worm’ has the potential to permanently damage
hardware by over using computer resources as it copies it’s self rapidly and repeatedly in a
computer’s memory or network. In addition to these threats, a ‘Trojan Horse’ is a malicious
software package, designed to look legitimate, which contains damaging instructions causing a
severe breach in computer security.

An example could include the sending of an email to thousands of computers, with an
attachment containing fake software, claiming to do something good for your computer, such as
increase processing speed, but as recipients of the email opens the email and install the
software, they experience, first hand, a computer security risk.

1. B) Computer literacy

Simply put, computer literacy refers to a knowledge and understanding of what a computer is,
how it works and what are the basic uses of a computer.

Understanding that a computer is an electrical device, operating under control of instructions
stored in its memory that can accept and process data, according to specific rules, to produce
and store results for later use.

Understanding how this is all achieved requires knowledge of both input and output devices
known as hardware, the equipment that makes up the computer. In conjunction to this,
understanding that it is the software that instructs the hardware how to perform specified tasks.
Computers can be used to create newsletters, receipts, pictures, invoices and much more.

1. C) Information literacy

Information literacy is a skill that is developed in numerous areas of a person’s life, not simply
sitting in front of a computer. This term refers to the ability to find and analyse information from
more than one place or source and to then select and organize the information according to the
required needs. Through the development of this skill, people are better equipped to make
decisions accurately and take specific actions based on their findings.

Having a high level of information literacy can assist a person in achieving more actions or
decisions in less time. For example, buying a new car, where different cars could be quickly
compared on the internet. This could also be achieved by visiting several physical locations, car
retail outlets, and comparing them this way.

1. D) Integration literacy

Forming part of a process, integration literacy is the stage at where information is appropriately
matched or allocated to specific task. In the context of a teaching environment, teachers are not

Lerne den Verkäufer kennen

Seller avatar
Bewertungen des Ansehens basieren auf der Anzahl der Dokumente, die ein Verkäufer gegen eine Gebühr verkauft hat, und den Bewertungen, die er für diese Dokumente erhalten hat. Es gibt drei Stufen: Bronze, Silber und Gold. Je besser das Ansehen eines Verkäufers ist, desto mehr kannst du dich auf die Qualität der Arbeiten verlassen.
ChrisThompson University of South Africa (Unisa)
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
748
Mitglied seit
7 Jahren
Anzahl der Follower
308
Dokumente
180
Zuletzt verkauft
1 Jahren vor
Unisa's B'Ed degree - focus on the 14 compulsory educational modules

I completed my B'Ed degree in 2019 and have now started a Honors degree in Inclusive Education. I hope that these study notes will help you succeed as they did me. Apologies for not having them typed out; the reason for this is that I learn and remember more when I write them down by hand. If there is anything I can help you with, please send me a message via Stuvia and I'll get back to you as soon as possible. I wish you all the best with your studies and encourage you to work diligently.

Mehr lesen Weniger lesen
3,8

16 rezensionen

5
7
4
2
3
4
2
2
1
1

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen