Information Technology 9626/11 Oct Nov 2022
Laura Bellini
You can download the PDF file for reference.
1. Utility Software | Definition and importance in system maintenance and optimization.
2. Malware Prevention in Companies | Security practices beyond antivirus protection, including user training and system policies.
3. Transaction File Processing | Explanation of update, insert, and delete operations with examples in payroll systems.
4. Electronic Funds Transfer (EFT) | Step-by-step process of how transactions are securely processed through banking networks.
5. Asymmetric Encryption | Explanation of public and private key cryptography and its role in data security.
6. Bridging the Digital Divide | Methods to reduce technology gaps between older and younger generations.
7. Spreadsheet Modeling for Population Forecasting | Evaluation of spreadsheet effectiveness in predicting population trends.
8. Proprietary vs. Open-Source Software | Differences, advantages, and disadvantages of each type.
9. Microprocessor-Controlled Greenhouse | Sensor-based automation, pseudocode logic, and pros and cons of automation in agriculture.
10. Confidentiality in Data Storage | Additional methods companies use beyond access restriction to protect sensitive information.
11. Indirect Data Sources | Explanation with examples of data sources that provide secondary or derived information.
See More Paper 1 a year ago
Information Technology (9626) Subject directory
All resources in one place
Related Past Papers
Related Tutorials
Crash report