0% found this document useful (0 votes)
62 views24 pages

Csec It Mayjune p2 2021 Answers

The document discusses various aspects of cybersecurity, including the importance of firewalls, password protection, and antivirus software to safeguard electronic devices from unauthorized access and fraud. It also highlights the significance of proper data entry and management in applications, as well as the information processing cycle. Additionally, it touches on the different types of computers and networks, emphasizing the need for secure online practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views24 pages

Csec It Mayjune p2 2021 Answers

The document discusses various aspects of cybersecurity, including the importance of firewalls, password protection, and antivirus software to safeguard electronic devices from unauthorized access and fraud. It also highlights the significance of proper data entry and management in applications, as well as the information processing cycle. Additionally, it touches on the different types of computers and networks, emphasizing the need for secure online practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Eletronic Devices that are left or placed in a state of weakness for example due to having no

firewall installed hackers are able to gain access to your computer system n network

external

external

internal

external

No food/drinks allowed while using the pc

Password encrypted system to prevent unauthorized access

strap down pc to prevent theft of system


cybersecurity protect networks, systems and digital footprints - online presences

computer security protects the Eletronic devices hardware and software from damages

caused by internal or external forces

Eletronic Eas dropping, credit/debit card scam, fraud, fraudulent activities

Secure information online by not sharing card detail online at anytime

Dont click on suspicious links in email or text messages

install antivirus to protect when using card online

install firewall on network to ensure data is safe


Open CONACTS table
scroll to the last record added
select the last record degree column and press enter
then start to enter new record information

Incorrect DATA TYPE ENTERED

Remove what was typed before and retype with correct data type

or

based on situation change data type in the DESIGN VIEW AREA


2

ID# 7 AND ID#14

TWO (2) RECORDS


FALSE

FALSE

TRUE

TRUE

FALSE

TRUE

APPLICATION SOFTWARE ARE SOFTWARES CREATED FOR A REASON OR PURPOSE

SYSTEM SOFTWARE CONTROLS BOTH THE HARDWARE AND APPLICATION SOFTWARE

PRINTER

SCANNER

PROJECTOR

COMPUTER
INFORMATION PROCESSING CYCLE

MANUAL

DIRECT

MANUAL

DIRECT
HYPERLINK

INCASE OF GRAMMATICAL ERRORS IN THE HYPERLINK WHICH


WOULD PREVENT USERS FROM ACCESSING THE SITE

TO ENSURE THE WEBISTE LINK WAS ENTER CORRECTLY TO PREVENT


USERS FROM VISITING INCORRECT WEBSITE
TABLES, FONT COLOUR AND CENTER ALIGN

SIZE, COLUMNS AND MARGINS

GO TO FILE AND SELECT SAVE AS

RENAME THE NEW DOCUMENT


AND START TO UPDATE THE FLYER

WHILE WORKING - ENCRYPT WITH PASSWORD OR


RESTRICT EDITING

FINAL DOCUMENT - RESTRICT ACCESS AND MARK AS FINAL


WAN

wide area network

wired
wireless

wired
wireless
11. highlight data needed for graph (Highlight Days)
2.go to insert
3. Select Chart
4.Choose a chart style (pie, Colum etc).\
5.Create graph and add data labels

=average(e2:e11)

=if
e2>30

1. select cell f2
1. select cell f2
2. ctrl+c to copy the function
2.Under home goto clipboard
3. highlight cells f3:f11
3select copy
4.Press Crtl+v to paste
4.highlight cells f3:11
5 go to clipboard
6. paste
number and product

VALUE

FOR DO
DECISION

7
14

21
28
LINE 2 - STRING >> DOUBLE
LINE 6 - SELECTION>> SELECTION1
LINE 6 -5 >> /2

LINE 7 - PRODUCT>> AVERAGE


LINE 7 INPUT>> OUTPUT OR INPUT>> WRITELN

PROGRAM AVERAGE;
VAR
NUM1:INTEGER;
NUM2:INTEGER;
NUM3:INTEGER;
AVERAGE:DOUBLE;
BEGIN
WRITELN('PLEASE ENTER THE THREE NUMBER');
READLN(NUM1, NUM2, NUM3);

AVERAGE:=NUM1+NUM2+NUM3/;

WRITELN('YOUR AVERGAE IS:' , AVERAGE);


END.
SUPER COMPUTER

SERVER/MINI COMPUTER

MICROCOMPUTER/PERSONAL
COMPUTERS

OUTPUT

SYSTEM UNIT

STORAGE

INPUT

INPUT
WEBCAM

You might also like