0% found this document useful (0 votes)
9 views

Assignment#2

This document outlines an assignment for the B.S. Computer Science program at the Institute of Business Management, focusing on computer concepts and applications. It includes various course learning outcomes related to computer ethics, digital communication channels, security risks, and data privacy issues. The assignment is to be completed under the guidance of Engr. Qurrat-ul-Ain Naiyar and is worth a total of 10 marks.

Uploaded by

maida khan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Assignment#2

This document outlines an assignment for the B.S. Computer Science program at the Institute of Business Management, focusing on computer concepts and applications. It includes various course learning outcomes related to computer ethics, digital communication channels, security risks, and data privacy issues. The assignment is to be completed under the guidance of Engr. Qurrat-ul-Ain Naiyar and is worth a total of 10 marks.

Uploaded by

maida khan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

INSTITUTE OF BUSINESS MANAGEMENT

Department: Computer Science Program: B.S (Computer Science)

Assignment 2
MIS-402: Computer Concepts &
Applications

Announced Date: ___________ Due Date: _____________ Total Marks: 10 Marks


Teacher Name: Engr. Qurrat-ul-Ain Naiyar Marks Obtained:

Sr. No Course Learning Outcomes PLOs Blooms Taxonomy


Identify and discuss computer ethics and GA_2
CLO_2 security issues. (Knowledge for solving C2 (Understanding)
computing problems)

Discuss
a) main types of digital communication channels? Provide examples for each type.
b) digital security risks.
c) latest security trends.
d) digital forensic and its importance.
e) social engineering.
f) Phishing, Spyware and Adware.
g) how do data breaches affect individuals' information privacy, and what are the potential
consequences?
h) what role does consent play in information privacy, and how should it be obtained?
i) what are the key ethical concerns surrounding data privacy in today's digital age?
j) what security concerns should be addressed during the installation of a home network?

You might also like