A Journey to Excellence
Register
|
Login
|
Access premium content
|
Make Money
Menu
Toggle navigation
PSCUSTUDIES
University Section
Universities Listing
Study Notes,schemes of work, lesson plans,exams all levels etc.
Earn Money Online By Selling Academic Resources(
Hot New
)
Questions and Answers
Start Web Design/Software Development Course
College Section
Colleges Listing
Questions and Answers
College Past Papers Answers
Study Notes,schemes of work, lesson plans,exams all levels etc.
Earn Money Online By Selling Academic Resources(
Hot New
)
One-on-One Online Revision and Tutoring(
..
)
College Study Notes
Schemes of Work
Start Web Design/Software Development Course
Junior and Senior Secondary
Earn Money Online By Selling Academic Resources(
Hot New
)
Study Notes,schemes of work, lesson plans,exams all levels etc.
Grade 7 Exams
Grade 8 Exams
Grade 9 Exams
Form 4 Exams
Form 3 Exams
Form 2 Exams
Form 1 Exams
Schemes of Work
Questions and Answers
Lower and Upper Primary
Grade 1 Exams
Grade 2 Exams
Grade 3 Exams
Grade 4 Exams
Grade 5 Exams
Grade 6 Exams
Schemes of Work
Best Institutions
Best Universities
Best Colleges
Best High Schools
Best Primary Schools
My Account
Profile
Computer Studies questions and answers:Data Security and Control
Share Via:
Total of
50
Questions.
 
Search
1.
Define the term log files.
(Answered)
Define the term log files..
Posted On:
Thu 15, July 2021 05:30:25 am
2.
Define the term system sabotage as applied in computing.
(Answered)
Define the term system sabotage as applied in computing..
Posted On:
Thu 15, July 2021 05:31:14 am
3.
Give two ways in which software piracy can be reduced.
(Answered)
Give two ways in which software piracy can be reduced..
Posted On:
Thu 15, July 2021 05:32:46 am
4.
Give the importance of carrying out audit trail in an information system.
(Answered)
Give the importance of carrying out audit trail in an information system..
Posted On:
Thu 15, July 2021 05:33:37 am
5.
Differentiate between a hacker and a cracker.
(Answered)
Differentiate between a hacker and a cracker..
Posted On:
Thu 15, July 2021 05:34:50 am
6.
Define the term firewall.
(Answered)
Define the term firewall..
Posted On:
Thu 15, July 2021 05:35:27 am
7.
Give two types of firewall.
(Answered)
Give two types of firewall..
Posted On:
Thu 15, July 2021 05:36:08 am
8.
Define the following terms: a)Private data b)Confidential data c)Data security.
(Answered)
Define the following terms: a)Private data b)Confidential data c)Data security..
Posted On:
Thu 15, July 2021 05:37:13 am
9.
Explain three causes of data loss or program corruption in a computer system.
(Answered)
Explain three causes of data loss or program corruption in a computer system..
Posted On:
Thu 15, July 2021 05:38:30 am
10.
Mention three ways of ensuring efficient back up of data.
(Answered)
Mention three ways of ensuring efficient back up of data..
Posted On:
Thu 15, July 2021 05:39:15 am
11.
Name three types of computer viruses.
(Answered)
Name three types of computer viruses..
Posted On:
Thu 15, July 2021 05:39:45 am
12.
Differentiate between data security and privacy.
(Answered)
Differentiate between data security and privacy..
Posted On:
Thu 15, July 2021 05:40:34 am
13.
Give two ways of updating an antivirus software
(Answered)
Give two ways of updating an antivirus software.
Posted On:
Thu 15, July 2021 05:41:16 am
14.
List four possible threats to data security.
(Answered)
List four possible threats to data security..
Posted On:
Thu 15, July 2021 05:41:54 am
15.
Mention four forms of unauthorized access
(Answered)
Mention four forms of unauthorized access.
Posted On:
Thu 15, July 2021 05:42:28 am
16.
Define the term computer server.
(Answered)
Define the term computer server..
Posted On:
Thu 15, July 2021 05:43:05 am
17.
State four destructive activities that crackers can perform on a computer.
(Answered)
State four destructive activities that crackers can perform on a computer..
Posted On:
Thu 15, July 2021 05:44:27 am
18.
State one benefit of hacking to an organization’s computer system.
(Answered)
State one benefit of hacking to an organization’s computer system..
Posted On:
Thu 15, July 2021 05:45:11 am
19.
State two control measures a company can implement to restrict hackers from accessing its information system.
(Answered)
State two control measures a company can implement to restrict hackers from accessing its information system..
Posted On:
Thu 15, July 2021 05:46:20 am
20.
Other than hacking and cracking, explain any other three computer crimes.
(Answered)
Other than hacking and cracking, explain any other three computer crimes..
Posted On:
Thu 15, July 2021 05:48:01 am
21.
Natural disasters can cause Loss of data and programs. State two ways of ensuring that data/programs are not lost if a disaster strikes.
(Answered)
Natural disasters can cause Loss of data and programs. State two ways of ensuring that data/programs are not lost if a disaster strikes..
Posted On:
Thu 15, July 2021 05:49:17 am
22.
State two ways of recovering data lost through accidental erasure.
(Answered)
State two ways of recovering data lost through accidental erasure..
Posted On:
Thu 15, July 2021 05:51:14 am
23.
State ways in which piracy in the software industry can be minimized.
(Answered)
State ways in which piracy in the software industry can be minimized..
Posted On:
Thu 15, July 2021 05:52:08 am
24.
State any three functions of an antivirus software.
(Answered)
State any three functions of an antivirus software..
Posted On:
Thu 15, July 2021 05:52:58 am
25.
State three precautions a bank can take to prevent illegal data alterations.
(Answered)
State three precautions a bank can take to prevent illegal data alterations..
Posted On:
Thu 15, July 2021 05:53:52 am
26.
State one function of firewall.
(Answered)
State one function of firewall..
Posted On:
Thu 15, July 2021 05:54:33 am
27.
Differentiate between data encryption and use of password.
(Answered)
Differentiate between data encryption and use of password..
Posted On:
Thu 15, July 2021 05:55:18 am
28.
Define the term spyware.
(Answered)
Define the term spyware..
Posted On:
Thu 15, July 2021 05:56:10 am
29.
Define the term computer ethics.
(Answered)
Define the term computer ethics..
Posted On:
Thu 15, July 2021 05:56:49 am
30.
Give three items that may be covered by computer ethics.
(Answered)
Give three items that may be covered by computer ethics..
Posted On:
Thu 15, July 2021 05:57:49 am
31.
Define the following terms; i)Password ii)Authentication
(Answered)
Define the following terms; i)Password ii)Authentication.
Posted On:
Thu 15, July 2021 05:59:03 am
32.
Define the term computer virus.
(Answered)
Define the term computer virus..
Posted On:
Thu 15, July 2021 05:59:50 am
33.
Mention three features of computer viruses.
(Answered)
Mention three features of computer viruses..
Posted On:
Thu 15, July 2021 06:00:40 am
34.
Give three symptoms of computer infected by viruses.
(Answered)
Give three symptoms of computer infected by viruses..
Posted On:
Thu 15, July 2021 06:01:41 am
35.
List three ways through which viruses get into a computer system.
(Answered)
List three ways through which viruses get into a computer system..
Posted On:
Thu 15, July 2021 06:02:36 am
36.
Give four precaution that can be taken against computer viruses in a school.
(Answered)
Give four precaution that can be taken against computer viruses in a school..
Posted On:
Thu 15, July 2021 06:03:40 am
37.
Describe the following computer crimes;
(Answered)
Describe the following computer crimes;.
Posted On:
Thu 15, July 2021 06:05:35 am
38.
Mention two examples of cyberterrorism.
(Answered)
Mention two examples of cyberterrorism..
Posted On:
Thu 15, July 2021 06:06:11 am
39.
Describe how a firewall works.
(Answered)
Describe how a firewall works..
Posted On:
Thu 15, July 2021 06:07:22 am
40.
Describe the following methods of detection and protection of computer crimes:
(Answered)
Describe the following methods of detection and protection of computer crimes:.
Posted On:
Thu 15, July 2021 06:09:06 am
41.
Describe two areas covered by laws relating to information system.
(Answered)
Describe two areas covered by laws relating to information system..
Posted On:
Thu 15, July 2021 06:10:15 am
42.
Give one law which relates to data and information systems used in Kenya.
(Answered)
Give one law which relates to data and information systems used in Kenya..
Posted On:
Thu 15, July 2021 06:11:16 am
43.
Mention the risk to data associated with the opening and responding to spam mail.
(Answered)
Mention the risk to data associated with the opening and responding to spam mail..
Posted On:
Thu 15, July 2021 06:12:00 am
44.
Define the following terms. i)Virus hoaxes ii)Computer worm iii)Trojan iv)Phishing v)Adware vi)Identity theft
(Answered)
Define the following terms. i)Virus hoaxes ii)Computer worm iii)Trojan iv)Phishing v)Adware vi)Identity theft.
Posted On:
Thu 15, July 2021 06:15:07 am
45.
Define the term data control.
(Answered)
Define the term data control..
Posted On:
Thu 15, July 2021 06:17:06 am
46.
Define the term cyberterrorism.
(Answered)
Define the term cyberterrorism..
Posted On:
Thu 15, July 2021 06:17:42 am
47.
Explain five data security practices that can be carried out by an organization.
(Answered)
Explain five data security practices that can be carried out by an organization..
Posted On:
Thu 15, July 2021 06:19:00 am
48.
Define the term computer fraud.
(Answered)
Define the term computer fraud..
Posted On:
Thu 15, July 2021 06:19:40 am
49.
Give an example of computer fraud.
(Answered)
Give an example of computer fraud..
Posted On:
Thu 15, July 2021 06:20:17 am
50.
Differentiate between the terms eavesdropping and tapping as used in data security
(Answered)
Differentiate between the terms eavesdropping and tapping as used in data security.
Posted On:
Thu 15, July 2021 06:21:06 am
Page 1 of 1
Previous
1
Next
More Topics:
Application areas of information and communication technology
Data processing cycle
Desktop Publishing
Elementary programming principles
Email and Internet
Impact of communication technology and information on society and carreer oportunity
Introduction to Computers
Introduction to networking and data communication
System development
About Us
Contact us
Terms of use
|
Privacy policy
Follow Us:
All Rights Reserved © 2024; pscustudies.com