100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Antwoorden

FDEME3L Assignment 2 Distinction Pass

Beoordeling
-
Verkocht
1
Pagina's
9
Geüpload op
16-11-2018
Geschreven in
2015/2016

FDEME3L Assignment 2 Distinction Pass

Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
16 november 2018
Aantal pagina's
9
Geschreven in
2015/2016
Type
Antwoorden
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

FDEME3L-02- 556699 Page 1 of 9 C. Thompson - 56068484




FDEME3L
ASSIGNMENT 02
Unique Number:
556699
Due Date: 2015/04/24
First semester: 20 Apr 2015

Christopher
Thompson
Student Number:
56068484




Table of contents

Page Title
1 Cover Page
2-3 Question 1

4 Question 2

5-6 Question 3

7-8 Question 4

8 References

9 Blank page

, FDEME3L-02- 556699 Page 2 of 9 C. Thompson - 56068484


QUESTION 1

1. A) Computer security risk

In this modern age, quick access to digitally stored information provides a solution to the
demands of increased productivity in shorter periods of time. This digital information requires
computer equipment, software, data and information, processing capabilities. Should an event
or action take place which damages any of these four vital components, which could lead to the
loss or damage of information, it is deemed a computer security risk.

Computer viruses are designed to destroy or corrupt data, which spread quickly through
unprotected computers and storage devices. A ‘Worm’ has the potential to permanently damage
hardware by over using computer resources as it copies it’s self rapidly and repeatedly in a
computer’s memory or network. In addition to these threats, a ‘Trojan Horse’ is a malicious
software package, designed to look legitimate, which contains damaging instructions causing a
severe breach in computer security.

An example could include the sending of an email to thousands of computers, with an
attachment containing fake software, claiming to do something good for your computer, such as
increase processing speed, but as recipients of the email opens the email and install the
software, they experience, first hand, a computer security risk.

1. B) Computer literacy

Simply put, computer literacy refers to a knowledge and understanding of what a computer is,
how it works and what are the basic uses of a computer.

Understanding that a computer is an electrical device, operating under control of instructions
stored in its memory that can accept and process data, according to specific rules, to produce
and store results for later use.

Understanding how this is all achieved requires knowledge of both input and output devices
known as hardware, the equipment that makes up the computer. In conjunction to this,
understanding that it is the software that instructs the hardware how to perform specified tasks.
Computers can be used to create newsletters, receipts, pictures, invoices and much more.

1. C) Information literacy

Information literacy is a skill that is developed in numerous areas of a person’s life, not simply
sitting in front of a computer. This term refers to the ability to find and analyse information from
more than one place or source and to then select and organize the information according to the
required needs. Through the development of this skill, people are better equipped to make
decisions accurately and take specific actions based on their findings.

Having a high level of information literacy can assist a person in achieving more actions or
decisions in less time. For example, buying a new car, where different cars could be quickly
compared on the internet. This could also be achieved by visiting several physical locations, car
retail outlets, and comparing them this way.

1. D) Integration literacy

Forming part of a process, integration literacy is the stage at where information is appropriately
matched or allocated to specific task. In the context of a teaching environment, teachers are not

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ChrisThompson University of South Africa (Unisa)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
748
Lid sinds
7 jaar
Aantal volgers
308
Documenten
180
Laatst verkocht
1 jaar geleden
Unisa's B'Ed degree - focus on the 14 compulsory educational modules

I completed my B'Ed degree in 2019 and have now started a Honors degree in Inclusive Education. I hope that these study notes will help you succeed as they did me. Apologies for not having them typed out; the reason for this is that I learn and remember more when I write them down by hand. If there is anything I can help you with, please send me a message via Stuvia and I'll get back to you as soon as possible. I wish you all the best with your studies and encourage you to work diligently.

Lees meer Lees minder
3,8

16 beoordelingen

5
7
4
2
3
4
2
2
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen