NATIONAL SENIOR CERTIFICATE GRADE 12 COMPUTER APPLICATIONS TECHNOLOGY P2 (THEORY) NOVEMBER 2010 MARKS: 150 TIME: 3 hours This question paper consists of 15 pages. Copyright reserved Please turn over Computer Applications Technology/P2 2 NSC DBE/November 2010 INSTRUCTIONS AND INFORMATION 1. 2. 3. This question paper consists of SECTION A and SECTION B. Answer ALL the questions. Number the answers correctly according to the numbering system used in this question paper.
Premium Personal computer Hard disk drive E-mail
Final Term Paper : Mobile Security By: Sibbonai Carswell 9/14/2013 RES/531 Mobile phone usage is at its highest right now. I know personally if I don’t have my cell phone I feel like I am missing my closet accessory. I do everything from my phone talk‚ text. Check email‚ pay bills‚ check my bank account‚ send money‚ receive money etc. Since so many different things are done on cell phones‚ mobile security has become a big issue. The subject of mobile computing is extremely important
Premium Mobile phone
What is Reliability and integrity for database? Alvin W. Demore II University of Maryland University College Abstract In this document we will be learning what reliability and integrity to databases and how company’s uses this technique to make sure that their company is strong and safe. Reliability plays a big part in databases because you need to make sure that everything can work without failing or crashing the system. The next big part is integrity because if you don’t have security in the
Premium Database Access control Security
In the past few decades there has been a revolution in computing and communications‚ and all indications are that technological progress and use of information technology will continue at a rapid pace. Accompanying and supporting the dramatic increases in the power and use of new information technologies has been the declining cost of communications as a result of both technological improvements and increased competition. Today‚ innovations in information technology are having wide-ranging effects
Premium Backup Computer virus
performance There are many threats that can affect system performance. These can come from many sources e.g. software downloads‚ floppy disks‚ CD’s‚ DVD’s‚ attachments and the internet. The threats are installed over the internet and are called spyware and adware. It is also possible for the threats to be transmitted through emails‚ key loggers which get through firewalls. The most malicious software‚ this comes in lots of forms which is designed to damage and disrupt. It’s important in the surgery to
Premium USB flash drive Computer security Floppy disk
Discovering Computers 2008 Chapter 9 Computer Security‚ Ethics and Privacy 1 2 Chapter 10 Objectives Describe the types of computer security risks Discuss the types of devices available that protect computers from system failure Identify ways to safeguard against computer viruses‚ worms‚ Trojan horses‚ botnets‚ denial of service attacks‚ back doors‚ and spoofing Explain the options available for backing up computer resources Discuss techniques to prevent unauthorized computer access and use
Premium E-mail Internet Computer virus
Critical Thinking We have many different levels of thinking. Some of the things that we do in our lives‚ such as breathing‚ walking‚ blinking‚ etc become almost instinctive and we really do not have to think much about them. Some things require more thought‚ such as deciding what to eat‚ or what to wear for a particular occasion. There are even higher levels of thinking and these include our critical thinking abilities. Many scholars have noted that critical thinking is more of a skill than a process
Premium Logic Critical thinking Reasoning
Internet to register‚ purchase or use email or texts 3. Malwarea. Designed to damage computer or steal information b. Covers any software installed on a computer with out the owners consent c. Mal- ware includes products such as spyware‚ Trojan horses‚ adware‚ and rootkits. 4. Ergonomicsa. The best way to design workplace for safety and productivity b. Raise awareness of you body parts of how to use the computer to maintain a safe and healthy workplace. c. Use of correct posture‚ and
Premium Malware Carpal tunnel syndrome Computer virus
As we have seen‚ public policy can drive the issues that create a cultural climate looking for change. Several issues that are finding platforms for discussion among politicians‚ teachers‚ and communities could provoke changes in the next few years. The trends we currently see in family support services are: * States adopting a variety of tax credits for working families giving them help with childcare and in-home care expenses (Hirschhorn Donahue‚ 2006) * Family-leave policies‚ allowing
Premium Malware Computer Computer security
Task 1 Introduction: In this task we will be listing different types of hardware and software that will be suitable in order to set up the computer lab. First we will be listing the different types of motherboards‚ processors and memory devices available on the market. Motherboards: Figure [ 1 ] Price | € 127.00 | SKU | MB-L90602 | Form Factor | ATX | CPU Socket | 1156
Premium Serial ATA Universal Serial Bus PCI Express