Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

CML1501 Assignment 1 & 2 Semester 2 2024 | Due 16 August 2024

Vendu
4
Pages
11
Qualité
A+
Publié le
10-08-2024
Écrit en
2024/2025

CML1501 Assignment 1 & 2 Semester 2 2024. All Questions answered with references. Assignment 1 - Due 16 August. 1.1 Write brief notes on THREE of the following: (a) The various types of licences available for broadcasting purposes. (3) (b) Possible crimes that can be committed in respect of information on a computer network. (3) (c) The liability of an employer should he/she read an employee's e-mail. (3) (d) The sanctions that can be imposed by the Independent Communications Authority of South Africa (ICASA) if a licensee has contravened the Electronic Communications Act 36 of 2005 or the conditions of his/her licence. (3) 1.2 List the fields of broadcasting and telecommunication which are regulated by means of statutes. [15] 2.1 A newspaper publishes a report regarding a prisoner who has escaped from prison. The photograph of a well-known actor is accidentally published next to the report, which creates the impression that he is the escaped prisoner. The actor threatens to institute proceedings for defamation and the newspaper publishes an apology in the next issue. May the actor institute proceedings for defamation against the owner of the newspaper? Discuss fully. (5) Assignment 2 - Due 19 September 2024. Question 1 (a) Explain whether the element of fault exists in a “delict” as either intention or negligence. (5) (b) Explain the meaning of the term “Damage” in delict. Give examples from case law.(5) (c) Explain the meaning of the word “damages” in delict. Give examples from case law.(5) Question 2 (a) What is meant by the statement that the fundamental principle of our law of evidence and criminal procedure demands that no person should be obliged to incriminate himself or herself? Give examples.(5) (b) Explain whether the law obliges journalists to answer questions lest they are sentenced to a term of imprisonment.(5) (c) What does section 205 of the Criminal Procedure Act, 1977 provides. Is that provision consistent with the Constitution of the Republic of South Africa, 1996?(5) Question 3 (a) Explain the claim of false disparagement.(5) (b) Explain the claim of passing off.(5) (c) Explain the claim of contravention of the Consumer Affairs (Unfair Business Practices) Act 71 of 1988 (5) Question 4 (a) Who can claim Copyright protection? (5) (b) Does the Copyright Act 98 of 1978 give a list of various categories of works that are protected? Explain each of them. (5) (c) Can any type or category of creation be protected under law? (5) Question 5 (a) Explain what is meant by Contempt of court. (5) (b) Explain contempt in facie curiae. (5) (c) When does a criminal case commence? (5) (d) Explain the constitution of a trade coupon. Is it may be constituting of a contract; a printed offer directed at a target group of clients, which may, in return, be returned by the consumer in order to receive something of value. (5)

Montrer plus Lire moins
Établissement
Cours









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

Livre connecté

École, étude et sujet

Établissement
Cours

Infos sur le Document

Publié le
10 août 2024
Nombre de pages
11
Écrit en
2024/2025
Type
Examen
Contenu
Questions et réponses

Sujets

Aperçu du contenu

, PLEASE USE THIS DOCUMENT AS A GUIDE TO ANSWER YOUR ASSIGNMENT

Please note that the author of this document will not responsibility for any plagiarizing you
commit.

 Assignment 1 - Due: 16 August 2024

1.1. Write brief notes on THREE of the following:

A) The various types of licences available for broadcasting purposes.

 Individual Licence: This type of license is issued to a specific broadcaster or operator. It is
often tailored to the particular needs and circumstances of the applicant and may include
specific terms and conditions related to the content, reach, or technical aspects of the
broadcasting service. Individual licenses typically involve a thorough vetting process and are
granted based on factors like the operator's qualifications and resources.

 Class Licence: A class license is a more general broadcasting license that applies to a category
or class of broadcasters rather than a single entity. Broadcasters that fall under this category
can operate without needing to apply for an individual license. The conditions and
requirements for a class license are predefined, and as long as broadcasters adhere to these,
they are covered by the license. This type of license simplifies the regulatory process and is
often used for smaller or less critical broadcasting operations.

 Exempt Licence: An exempt license allows certain types of broadcasting activities to be
carried out without the need for a formal license, typically because they are considered to be
low-risk or of minimal impact. For example, small-scale, non-commercial broadcasters, or
operators who only provide content within a very limited area or for a specific purpose, might
be exempt from licensing requirements. However, even under an exempt license, broadcasters
may still need to comply with certain basic regulatory standards.

(Study Guide - Page: 268)

B) Possible crimes that can be committed in respect of information on a computer network.

 Hacking: Unauthorized access to computer systems or networks, often with malicious intent
such as stealing sensitive information, disrupting operations, or damaging systems. Hackers
may exploit security vulnerabilities or use social engineering to gain access to systems.

 Phishing: A form of cybercrime where attackers deceive individuals into providing
confidential information, such as passwords or credit card numbers, by pretending to be a
legitimate entity. Phishing is commonly executed through fraudulent emails, websites, or
messages that appear trustworthy.

 Distribution of Malware: The intentional spreading of malicious software, including viruses,
worms, and ransomware, to infiltrate and damage computer systems or networks. Malware can
be used to steal data, disrupt services, or extort money from individuals or organizations.
Attackers may distribute malware through infected email attachments, compromised websites,
or malicious downloads.
(Study Guide - Page: 304-305)
2,61 €
Accéder à l'intégralité du document:
Acheté par 4 étudiants

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Avis des acheteurs vérifiés

Affichage de tous les 3 avis
1 année de cela

1 année de cela

1 année de cela

4,3

3 revues

5
2
4
0
3
1
2
0
1
0
Avis fiables sur Stuvia

Tous les avis sont réalisés par de vrais utilisateurs de Stuvia après des achats vérifiés.

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
Aimark94 University of South Africa (Unisa)
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
6575
Membre depuis
6 année
Nombre de followers
3168
Documents
1326
Dernière vente
3 semaines de cela
Simple & Affordable Study Materials

Study Packs & Assignments

4,2

520 revues

5
277
4
124
3
74
2
14
1
31

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions