Computer Studies questions and answers:Data Security and Control


Share Via:
        



Total of 50 Questions.
  

1.   Define the term log files.(Answered)
Define the term log files..
Posted On:Thu 15, July 2021 05:30:25 am
2.   Define the term system sabotage as applied in computing.(Answered)
Define the term system sabotage as applied in computing..
Posted On:Thu 15, July 2021 05:31:14 am
3.   Give two ways in which software piracy can be reduced.(Answered)
Give two ways in which software piracy can be reduced..
Posted On:Thu 15, July 2021 05:32:46 am
4.   Give the importance of carrying out audit trail in an information system.(Answered)
Give the importance of carrying out audit trail in an information system..
Posted On:Thu 15, July 2021 05:33:37 am
5.   Differentiate between a hacker and a cracker.(Answered)
Differentiate between a hacker and a cracker..
Posted On:Thu 15, July 2021 05:34:50 am
6.   Define the term firewall.(Answered)
Define the term firewall..
Posted On:Thu 15, July 2021 05:35:27 am
7.   Give two types of firewall.(Answered)
Give two types of firewall..
Posted On:Thu 15, July 2021 05:36:08 am
8.   Define the following terms: a)Private data b)Confidential data c)Data security.(Answered)
Define the following terms: a)Private data b)Confidential data c)Data security..
Posted On:Thu 15, July 2021 05:37:13 am
9.   Explain three causes of data loss or program corruption in a computer system.(Answered)
Explain three causes of data loss or program corruption in a computer system..
Posted On:Thu 15, July 2021 05:38:30 am
10.   Mention three ways of ensuring efficient back up of data.(Answered)
Mention three ways of ensuring efficient back up of data..
Posted On:Thu 15, July 2021 05:39:15 am
11.   Name three types of computer viruses.(Answered)
Name three types of computer viruses..
Posted On:Thu 15, July 2021 05:39:45 am
12.   Differentiate between data security and privacy.(Answered)
Differentiate between data security and privacy..
Posted On:Thu 15, July 2021 05:40:34 am
13.   Give two ways of updating an antivirus software(Answered)
Give two ways of updating an antivirus software.
Posted On:Thu 15, July 2021 05:41:16 am
14.   List four possible threats to data security.(Answered)
List four possible threats to data security..
Posted On:Thu 15, July 2021 05:41:54 am
15.   Mention four forms of unauthorized access(Answered)
Mention four forms of unauthorized access.
Posted On:Thu 15, July 2021 05:42:28 am
16.   Define the term computer server.(Answered)
Define the term computer server..
Posted On:Thu 15, July 2021 05:43:05 am
17.   State four destructive activities that crackers can perform on a computer.(Answered)
State four destructive activities that crackers can perform on a computer..
Posted On:Thu 15, July 2021 05:44:27 am
18.   State one benefit of hacking to an organization’s computer system.(Answered)
State one benefit of hacking to an organization’s computer system..
Posted On:Thu 15, July 2021 05:45:11 am
19.   State two control measures a company can implement to restrict hackers from accessing its information system.(Answered)
State two control measures a company can implement to restrict hackers from accessing its information system..
Posted On:Thu 15, July 2021 05:46:20 am
20.   Other than hacking and cracking, explain any other three computer crimes.(Answered)
Other than hacking and cracking, explain any other three computer crimes..
Posted On:Thu 15, July 2021 05:48:01 am
21.   Natural disasters can cause Loss of data and programs. State two ways of ensuring that data/programs are not lost if a disaster strikes.(Answered)
Natural disasters can cause Loss of data and programs. State two ways of ensuring that data/programs are not lost if a disaster strikes..
Posted On:Thu 15, July 2021 05:49:17 am
22.   State two ways of recovering data lost through accidental erasure.(Answered)
State two ways of recovering data lost through accidental erasure..
Posted On:Thu 15, July 2021 05:51:14 am
23.   State ways in which piracy in the software industry can be minimized.(Answered)
State ways in which piracy in the software industry can be minimized..
Posted On:Thu 15, July 2021 05:52:08 am
24.   State any three functions of an antivirus software.(Answered)
State any three functions of an antivirus software..
Posted On:Thu 15, July 2021 05:52:58 am
25.   State three precautions a bank can take to prevent illegal data alterations.(Answered)
State three precautions a bank can take to prevent illegal data alterations..
Posted On:Thu 15, July 2021 05:53:52 am
26.   State one function of firewall.(Answered)
State one function of firewall..
Posted On:Thu 15, July 2021 05:54:33 am
27.   Differentiate between data encryption and use of password.(Answered)
Differentiate between data encryption and use of password..
Posted On:Thu 15, July 2021 05:55:18 am
28.   Define the term spyware.(Answered)
Define the term spyware..
Posted On:Thu 15, July 2021 05:56:10 am
29.   Define the term computer ethics.(Answered)
Define the term computer ethics..
Posted On:Thu 15, July 2021 05:56:49 am
30.   Give three items that may be covered by computer ethics.(Answered)
Give three items that may be covered by computer ethics..
Posted On:Thu 15, July 2021 05:57:49 am
31.   Define the following terms; i)Password ii)Authentication(Answered)
Define the following terms; i)Password ii)Authentication.
Posted On:Thu 15, July 2021 05:59:03 am
32.   Define the term computer virus.(Answered)
Define the term computer virus..
Posted On:Thu 15, July 2021 05:59:50 am
33.   Mention three features of computer viruses.(Answered)
Mention three features of computer viruses..
Posted On:Thu 15, July 2021 06:00:40 am
34.   Give three symptoms of computer infected by viruses.(Answered)
Give three symptoms of computer infected by viruses..
Posted On:Thu 15, July 2021 06:01:41 am
35.   List three ways through which viruses get into a computer system.(Answered)
List three ways through which viruses get into a computer system..
Posted On:Thu 15, July 2021 06:02:36 am
36.   Give four precaution that can be taken against computer viruses in a school.(Answered)
Give four precaution that can be taken against computer viruses in a school..
Posted On:Thu 15, July 2021 06:03:40 am
37.   Describe the following computer crimes;(Answered)
Describe the following computer crimes;.
Posted On:Thu 15, July 2021 06:05:35 am
38.   Mention two examples of cyberterrorism.(Answered)
Mention two examples of cyberterrorism..
Posted On:Thu 15, July 2021 06:06:11 am
39.   Describe how a firewall works.(Answered)
Describe how a firewall works..
Posted On:Thu 15, July 2021 06:07:22 am
40.   Describe the following methods of detection and protection of computer crimes:(Answered)
Describe the following methods of detection and protection of computer crimes:.
Posted On:Thu 15, July 2021 06:09:06 am
41.   Describe two areas covered by laws relating to information system.(Answered)
Describe two areas covered by laws relating to information system..
Posted On:Thu 15, July 2021 06:10:15 am
42.   Give one law which relates to data and information systems used in Kenya.(Answered)
Give one law which relates to data and information systems used in Kenya..
Posted On:Thu 15, July 2021 06:11:16 am
43.   Mention the risk to data associated with the opening and responding to spam mail.(Answered)
Mention the risk to data associated with the opening and responding to spam mail..
Posted On:Thu 15, July 2021 06:12:00 am
44.   Define the following terms. i)Virus hoaxes ii)Computer worm iii)Trojan iv)Phishing v)Adware vi)Identity theft(Answered)
Define the following terms. i)Virus hoaxes ii)Computer worm iii)Trojan iv)Phishing v)Adware vi)Identity theft.
Posted On:Thu 15, July 2021 06:15:07 am
45.   Define the term data control.(Answered)
Define the term data control..
Posted On:Thu 15, July 2021 06:17:06 am
46.   Define the term cyberterrorism.(Answered)
Define the term cyberterrorism..
Posted On:Thu 15, July 2021 06:17:42 am
47.   Explain five data security practices that can be carried out by an organization.(Answered)
Explain five data security practices that can be carried out by an organization..
Posted On:Thu 15, July 2021 06:19:00 am
48.   Define the term computer fraud.(Answered)
Define the term computer fraud..
Posted On:Thu 15, July 2021 06:19:40 am
49.   Give an example of computer fraud.(Answered)
Give an example of computer fraud..
Posted On:Thu 15, July 2021 06:20:17 am
50.   Differentiate between the terms eavesdropping and tapping as used in data security(Answered)
Differentiate between the terms eavesdropping and tapping as used in data security.
Posted On:Thu 15, July 2021 06:21:06 am
Page 1 of 1
More Topics:


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com