It Paper 2 June 2021
It Paper 2 June 2021
A computer sysytem that is susceptible to attacks from cyber criminals ( a flaw that gets
used to access of a sysytem
external
internal
internal
external
Identity theft
Phishing is when someone send a link that when opened can give access to your
device
false
true
true
false
false
true
System Software runs in the background and ensure the computer works effectively while
application software runs in the foreground and allows for user interaction
hyperlink
wired
wireless
wired
wireless
=if e2>30)
Highlight F2
place the mouse pointer
NUMBER, PRODUCT
value
for loop
decision box
input/output box
14
21
28
2. average as real
6. SELECTION1*
6. - should be /
6. 5 should be 2
start
super computer
mainframe
Deskstop
monitor input
System unit
Cd Drive input
mouse input
keyboard input