Define the term log files.(Answered)
Define the term system sabotage as applied in computing.(Answered)
Give two ways in which software piracy can be reduced.(Answered)
Give the importance of carrying out audit trail in an information system.(Answered)
Differentiate between a hacker and a cracker.(Answered)
Define the term firewall.(Answered)
Give two types of firewall.(Answered)
Define the following terms:
a)Private data
b)Confidential data
c)Data security.(Answered)
Explain three causes of data loss or program corruption in a computer system.(Answered)
Mention three ways of ensuring efficient back up of data.(Answered)
Name three types of computer viruses.(Answered)
Differentiate between data security and privacy.(Answered)
Give two ways of updating an antivirus software(Answered)
List four possible threats to data security.(Answered)
Mention four forms of unauthorized access(Answered)
Define the term computer server.(Answered)
State four destructive activities that crackers can perform on a computer.(Answered)
State one benefit of hacking to an organization’s computer system.(Answered)
State two control measures a company can implement to restrict hackers from accessing its information system.(Answered)
Other than hacking and cracking, explain any other three computer crimes.(Answered)
Natural disasters can cause Loss of data and programs.
State two ways of ensuring that data/programs are not lost if a disaster strikes.(Answered)
State two ways of recovering data lost through accidental erasure.(Answered)
State ways in which piracy in the software industry can be minimized.(Answered)
State any three functions of an antivirus software.(Answered)
State three precautions a bank can take to prevent illegal data alterations.(Answered)
State one function of firewall.(Answered)
Differentiate between data encryption and use of password.(Answered)
Define the term spyware.(Answered)
Define the term computer ethics.(Answered)
Give three items that may be covered by computer ethics.(Answered)
Define the following terms;
i)Password
ii)Authentication(Answered)
Define the term computer virus.(Answered)
Mention three features of computer viruses.(Answered)
Give three symptoms of computer infected by viruses.(Answered)
List three ways through which viruses get into a computer system.(Answered)
Give four precaution that can be taken against computer viruses in a school.(Answered)
Describe the following computer crimes;(Answered)
Mention two examples of cyberterrorism.(Answered)
Describe how a firewall works.(Answered)
Describe the following methods of detection and protection of computer
crimes:(Answered)
Describe two areas covered by laws relating to information system.(Answered)
Give one law which relates to data and information systems used in Kenya.(Answered)
Mention the risk to data associated with the opening and responding to spam
mail.(Answered)
Define the following terms.
i)Virus hoaxes
ii)Computer worm
iii)Trojan
iv)Phishing
v)Adware
vi)Identity theft(Answered)
Define the term data control.(Answered)
Define the term cyberterrorism.(Answered)
Explain five data security practices that can be carried out by an organization.(Answered)
Define the term computer fraud.(Answered)
Give an example of computer fraud.(Answered)
Differentiate between the terms eavesdropping and tapping as used in data
security(Answered)