File 5
File 5
Router: Connects multiple devices to a network and directs data traffic between them. It also
manages connections to the internet [2: https://wcedeportal.co.za/teacher-
main/67146/FET/101/56591/Computer%20Applications%20Technology%20%3A%20Grade%2
012].
Shaping (Traffic Shaping): An ISP technique that prioritizes certain types of data traffic over
others, potentially affecting download and upload speeds [5:
https://dictionary.cambridge.org/dictionary/learner-english/computer-science].
• Advantage: ISPs can prevent network congestion and ensure quality of service for
specific applications.
• Disadvantage: Can limit user experience by slowing down certain types of traffic.
Data cap: A limit set by an ISP on the amount of data a user can download or upload within a
billing period. Exceeding the data cap may result in additional charges [5:
https://dictionary.cambridge.org/dictionary/learner-english/computer-science].
Broadband: Refers to high-bandwidth internet access that enables fast data transfer rates suitable
for streaming, video conferencing, and large file downloads. Examples of broadband include
cable, DSL, fiber optic [5: https://dictionary.cambridge.org/dictionary/learner-english/computer-
science].
FTP (File Transfer Protocol): A network protocol used for transferring files between computers
on a network. FTP clients and servers are used to initiate and manage file transfers [5:
https://dictionary.cambridge.org/dictionary/learner-english/computer-science].
Cloud computing: A model for delivering on-demand IT services and resources (servers,
storage, databases, software, etc.) over the internet. Users access these services through a web
browser or client application without managing the underlying infrastructure [5:
https://dictionary.cambridge.org/dictionary/learner-english/computer-science].
EULA (End-User License Agreement): A legal contract between a software developer and a
user that outlines the terms of use for the software. It specifies how the software can be used,
copied, and distributed [5: https://dictionary.cambridge.org/dictionary/learner-english/computer-
science].
Internet of Things (IoT): Refers to the network of physical devices embedded with sensors,
software, and other technologies that allows them to connect and exchange data with other
devices and systems over the internet. Examples include smart home devices, wearables, and
industrial sensors [5: https://dictionary.cambridge.org/dictionary/learner-english/computer-
science].
Crowdfunding: A method of raising funds by soliciting small contributions from a large number
of people via online platforms. It is a way to finance a business or creative project without
traditional financial institutions [5: https://dictionary.cambridge.org/dictionary/learner-
english/computer-science].
Grid computing: Harnesses the combined processing power of multiple computers to perform
large and complex tasks that would be beyond the capabilities of any single computer. Grids are
often used for scientific research and simulations [1:
https://www.siyavula.com/read/za/information-technology/grade-12/networks/09-networks].
Firewall: A security system that monitors incoming and outgoing network traffic and allows or
blocks data packets based on a set of security rules. It helps to prevent unauthorized access,
malicious
Sources
info
1. sharkstriker.com/blog/test-your-cyberdefense-with-hackers-mindset/
Question 5
Computer crimes are illegal activities that involve using computers and networks
https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention]. These crimes
can target individuals, businesses, or governments.
• Phishing https://www.kaspersky.co.za/resource-center/threats/what-is-cybercrime] -
Trying to trick someone into giving up personal information (like passwords or credit
card numbers) by pretending to be a legitimate company or person in an email or message
https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention].
Phishing emails often contain links that, when clicked, take the victim to a fake website
that looks real.
• Ransomware https://cybertalents.com/blog/what-is-cyber-crime-types-examples-
and-prevention] - A type of malware that encrypts a victim's files, making them
inaccessible. The attacker then demands a ransom payment in exchange for decrypting the
files.
• Malware https://www.techtarget.com/searchsecurity/definition/malware] - Malicious
software that is designed to harm a computer system. Malware can include viruses,
worms, Trojan horses, spyware, and ransomware
https://www.techtarget.com/searchsecurity/definition/malware].
• Computer Viruses http://cybercrime.org.za/malware/] - A type of malware that can
replicate itself and spread to other computers. Viruses can damage files, steal data, or
disrupt computer operations http://cybercrime.org.za/malware/].
• Identity Theft https://cybertalents.com/blog/what-is-cyber-crime-types-examples-
and-prevention] - When someone steals another person's personal information (like
name, Social Security number, or credit card number) to commit fraud.
• DoS attacks (Denial-of-Service attacks) - An attempt to overload a computer system
with traffic, making it unavailable to legitimate users https://cybertalents.com/blog/what-
is-cyber-crime-types-examples-and-prevention].
• Pharming - Deceives a user into visiting a fraudulent website that looks like a legitimate
one https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention].
This can be done by hacking a DNS server or exploiting weaknesses in a user's computer.
• Clickjacking - Tricks a user into clicking on a malicious link or button that they didn't
intend to click https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-
prevention]. This can be done by hiding a malicious link
Question 6
While the provided resources [1, 2, 3] don't directly cover identifying mistakes in HTML tags or
database field properties, here's a breakdown of the concepts to help you with solution
development:
• HTML Tags: Building blocks of web pages, defining content and structure. Examples
include <p> for paragraph, <b> for bold text, <img> for image.
• Identifying Mistakes: Common mistakes include missing closing tags (e.g., <h1> but no
</h1>), incorrect nesting (e.g., <b><i>text</i></b> instead of <i><b>text</b></i>),
or using outdated tags.
• Tips: Use a code validator or editor with syntax highlighting to catch errors. Manually
check for proper nesting and balance of opening/closing tags.
Here are some resources that can help you learn more about identifying mistakes in HTML and
setting field properties in databases:
• HTML: https://www.w3schools.com/html/
• Database Design: https://en.wikipedia.org/wiki/Database_normalization
Remember, practice is key! Try creating HTML code and databases to solidify your
understanding.