QUESTION 1
Describe and discuss ways of protecting information or data in the
system/computer
1. Access Control:
User Authentication: Implement strong authentication methods like passwords,
biometrics, or multi-factor authentication (MFA) to ensure only authorized users can
access the system.
User Permissions: Assign specific permissions and access rights to users or
groups based on their roles. This minimizes the risk of unauthorized access.
2. Encryption:
Data Encryption: Encrypt data at rest and in transit using encryption
algorithms like AES or SSL/TLS. This ensures that even if unauthorized access
occurs, the data is unreadable without the encryption key.
Full Disk Encryption (FDE): Encrypt the entire hard drive to protect data if the
computer is lost or stolen.
3. Password Management:
● Encourage strong, unique passwords for different accounts and
systems.
● Implement password policies, including password complexity
requirements and regular password changes.
4. Access Control:
● Employ access controls and permission management to restrict data
access to authorized users only.
● Apply the principle of least privilege, which means granting users the
minimum level of access necessary to perform their tasks.
5. Data Backup and Recovery:
● Regularly back up data to an offsite location to mitigate the risk of data
loss due to hardware failures, malware, or other incidents.
● Test data recovery procedures to ensure that data can be restored
when needed.
6. Antivirus and Anti-Malware Software:
● Install reputable antivirus and anti-malware software to detect and
remove malicious software.
● Keep the software up to date and schedule regular scans.
7. Data Loss Prevention (DLP):
● Use DLP tools to monitor and prevent the unauthorized transfer of
sensitive data, both internally and externally.
8. Data Classification and Handling:
● Classify data based on its sensitivity and importance. Implement
different security measures for different classes of data.
9. Logging and Monitoring:
Maintain detailed logs of system and network activities and regularly review
them for signs of intrusion or suspicious behavior.
10. Network Segmentation:
Divide your network into segments to limit lateral movement for attackers in
case of a breach. This prevents unrestricted access to sensitive data.
11. Secure Mobile Devices:
Extend security measures to mobile devices that connect to the system.
Implement mobile device management (MDM) solutions to enforce security
policies.
QUESTION 2
Define the word Hacking and its complication in technology
DEFINITION OF THE TERM HACKING
Hacking typically refers to the unauthorized or unlawful intrusion into
computer systems, networks, or devices with the intent to access,
manipulate, steal, or disrupt data or functionality. It involves exploiting
vulnerabilities or weaknesses in computer systems to gain unauthorized
access or control.
COMPLICATIONS CAUSED BY HACKING IN TECHNOLOGY
1. Security Breaches:
Hacking can result in data breaches, where sensitive information such as
personal data, financial records, or intellectual property is stolen. This can
lead to identity theft, financial losses, or reputational damage for individuals
and organizations.
2. Financial Losses:
Hacking incidents can lead to financial losses, both for individuals and
businesses. This includes the cost of investigating and mitigating the
breach, potential fines for non-compliance with data protection
regulations, and the loss of revenue due to downtime.
3. Privacy Violations:
Hacking can compromise individuals' privacy by accessing personal data,
including email accounts, social media profiles, and private photos. This
invasion of privacy can have far-reaching consequences.
4. Legal Consequences:
Perpetrators of hacking may face legal consequences, such as criminal
charges, fines, and imprisonment, if caught and prosecuted.
5. Reputation Damage:
Hacking incidents can tarnish the reputation of individuals or
organizations. Trust in a company's ability to safeguard customer data can
be severely undermined.
6. Intellectual property theft
Is when someone steals an idea, creative expression or invention from an
individual or a company.
QUESTION 3
Describe guidelines for creating and managing files and folder
naming in the system/computer
Creating Files:
● Use Descriptive Names: Give your files meaningful names that
reflect their content. Avoid generic names like "document1" or
"file123."
● Use Appropriate File Extensions: Choose the right file extension for
your file type (e.g., .docx for Word documents, .jpg for images, .pdf for
PDFs). This helps both you and your computer identify the file type.
● Organize Files into Folders: Create folders (directories) to group
related files. For example, create separate folders for work-related
documents, personal files, and projects.
● Date or Version Information: Consider adding dates or version
numbers to file names if it helps you track changes or identify the most
recent version.
● Avoid Special Characters: Some special characters, such as /, , :,
*, ?, ", <, >, |, can cause issues in file names. Stick to alphanumeric
characters, underscores, and hyphens.
Managing Files:
● Backup your Files: Regularly back up your files to avoid data loss.
Use cloud storage services, external hard drives, or network-
attached storage (NAS) for this purpose.
● Delete Unnecessary Files: Periodically go through your files and
delete those you no longer need. This keeps your storage organized
and reduces clutter.
● Use Shortcuts: You can create shortcuts or aliases to files or
folders you frequently access. This can help you access files more
quickly.
● Archive Old Files: For files you want to keep but don't need
regular access to, consider moving them to an "Archive" folder.
QUESTION 4
Describe digital presentation tools that can be used to present data
● Microsoft PowerPoint:
PowerPoint is one of the most widely used presentation software in the business
world. It offers a wide range of templates, animations, and design features to create
professional-looking slideshows. Users can include text, images, videos, charts, and
graphs.
● Google Slides:
Google Slides is a web-based presentation tool that's part of Google Workspace
(formerly G Suite). It allows for real-time collaboration, making it a great choice for
teams working remotely. It offers basic features for creating and sharing
presentations.
● Keynote:
Keynote is Apple's presentation software, available on macOS and iOS devices. It's
known for its elegant and customizable templates, as well as powerful animations
and transitions.
● Prezi:
Prezi is a cloud-based presentation tool that takes a non-linear approach to
presentations. It allows you to create dynamic, zoom able presentations, which can
be more engaging than traditional slide-by-slide presentations.
● Slide Share:
Slide Share is a platform for sharing and discovering presentations. Users can
upload their presentations to the site and share them with a broader
audience.
● Canva:
While Canva is primarily known as a graphic design tool, it offers a range of
presentation templates that allow users to create visually stunning slideshows.
It's an excellent choice for those who prioritize design.
● Powtoon:
Powtoon is an animated video and presentation maker. It's suitable for creating
animated, engaging presentations with characters, objects, and transitions.
QUESTION 5
Share your understanding of Ribbon, Bookmarks and File-extension in
computer
RIBBON
● Ribbon refers to a user interface element in software applications, particularly
in programs like Microsoft Office (e.g., Microsoft Word, Excel, and
PowerPoint). It is a tabbed toolbar that provides easy access to various
commands and features within the application.
● The Ribbon typically organizes commands into tabs, and each tab contains
related tools and options. For example, in a word processing application, the
Ribbon may have tabs like "Home," "Insert," "Page Layout," "References,"
and more.
● The Ribbon is designed to make it easier for users to find and use the tools
they need, as it presents a more visually organized and intuitive way to
access application functions.
BOOKMARKS
● Bookmarks are a feature in web browsers and some other software
applications that allow users to save the URL (Uniform Resource Locator)
of a web page or a specific location within a document or webpage for
easy access later.
● In web browsers, bookmarks are used to mark and quickly revisit websites
that the user finds interesting or frequently visits. Users can organize
bookmarks into folders and categorize them for better management.
● In documents and PDF readers, bookmarks are used to mark specific
sections or pages, making it easy to jump to those locations without
manually scrolling or searching.
FILE EXTENSION
● A file extension is a suffix added to the end of a filename, typically separated
from the filename by a period (e.g., ".txt," ".jpg," ".docx"). File extensions are
used to indicate the file's format, type, and associated application.
● For example, ".txt" is commonly used for plain text files, ".jpg" for image files,
and ".docx" for Microsoft Word documents. The file extension helps both the
user and the operating system understand how to open and handle the file.
● In many cases, the file extension is essential for determining which software
application should be used to open a particular file. For instance, ".xlsx" files
are opened with spreadsheet software like Microsoft Excel, while ".pdf" files
are opened with PDF readers.