0% found this document useful (0 votes)
8 views17 pages

It Paper 2 June 2021

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views17 pages

It Paper 2 June 2021

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

lOMoARcPSD|51167077

IT Paper 2 - JUNE 2021 edited

Information technology (University of Technology Jamaica)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by William Raghunanan ([email protected])
lOMoARcPSD|51167077

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

A computer sysytem that is susceptible to attacks from cyber criminals ( a flaw that gets
used to access of a sysytem

external

internal

internal

external

biometric system set up

use of network policies

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

Computer security refers to the security of a standalone machine as in the


hardware security of the physical device while Cyber security protects
information online or in cyber space

Identity theft

the use of user authentication ( validation code sent to email)


Educate persons about
use of biometrics Do not use unsolicited websites phishing.

Phishing is when someone send a link that when opened can give access to your
device

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

Data Type is incorrect

enter data type required

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

Record 7 and record 14

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

false

true

true

false

false

true

System Software runs in the background and ensure the computer works effectively while
application software runs in the foreground and allows for user interaction

Touch Screen or specialized keyboard

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

input , output , processing , Storage Information Processing Cycle

manual data entry


direct data entry

manual data entry

direct data entry

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

hyperlink

to ensure that the link is live

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

font colour and centre alignment

orientation and column and margin

save as and put in different file document

restrict editing, encrypt password, mark as final

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

Wide Area Network

wired

wireless

wired

wireless

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

Select Range (higlight d2:e11)


Select chart that you need from the insert ribbom

=average( e2: e11)

=if e2>30)

Highlight F2
place the mouse pointer

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

NUMBER, PRODUCT

value

for loop

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

decision box

input/output box

14
21

28

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

2. average as real

6. SELECTION1*

6. - should be /

6. 5 should be 2

7. input should be print

7. product should be average

start

Print " Enter Three Numbers"


Read num1
Read num2
Read num3
Avg<-- (num1+ num2+ num3)/3
Print "Average is ", avg
Stop

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

super computer
mainframe

Deskstop

monitor input

System unit

Cd Drive input

mouse input

keyboard input

Downloaded by William Raghunanan ([email protected])


lOMoARcPSD|51167077

Webcam -it captures videos and images

Downloaded by William Raghunanan ([email protected])

You might also like