(A) (B) (C) (D) (E) 5. (A) (B) (C) 6. 7. 8. 9. 10. I) Ii) Iii) Iv) V) 11. 12. 13. 14. 15. I) - Ii) - Iii) - 16
(A) (B) (C) (D) (E) 5. (A) (B) (C) 6. 7. 8. 9. 10. I) Ii) Iii) Iv) V) 11. 12. 13. 14. 15. I) - Ii) - Iii) - 16
v) Data alteration
vi) Fraud
vii) Firewalls
5. Give two reasons that may lead to computer fraud. (2 marks)
6. Outline four ways of preventing piracy with regard to data and information. (4 marks)
7. (a) Differentiate between Hacking and Cracking with reference to computer crimes.
(2 marks)
(b) Describe the following terms with respect to computer security: (6 marks)
(i) Audit trail.
(ii) Data Encryption.
(iii) Log files.
(iv) Firewalls.
(v) Physical security
(vi) Logic bombs.
8. (a) What is a Computer virus? (2 marks)
(b) Outline four symptoms of a virus infection in a computer system. (4 marks)
(b) State two damages which a computer virus may cause to a computer. (2 marks)
(c) Explain three control measures you would take to protect your computers from virus attacks.
(3 marks)
11. (i) Explain what is meant by the term “computer security” (2 marks)
(ii) State two environmental factors that can affect operations of a computer. (2 marks)
(iii) State two control techniques or measures that can be implemented to prevent the effect in (i) above.
(2 marks)
12. Explain why the following controls should be implemented for computer based systems.
i) Backups (2 marks)
ii) Air conditioning (2 marks)
iii) Uninterruptible power supply (UPS) (2 marks)
iv) Segregation of duties (2 marks)
v) Passwords (2 marks)
13. Give four rules that must be observed in order to keep within the law when working with data and information.
(4 marks)