Information Technology 9626/12 Oct Nov 2022
Laura Bellini
You can download the PDF file for reference.
### Key and Important Questions:
- Difference between data and information with practical examples
- Role of RAS (Reliability, Accessibility, and Serviceability) in mainframe computers
- Comparison of phishing, smishing, and vishing in cyber fraud
- Use of what-if analysis and goal seek in spreadsheet-based financial projections
- Importance of validation and verification in database management
- Advantages and disadvantages of using symmetric encryption for data protection
See More Paper 1 a year ago
Information Technology (9626) Subject directory
All resources in one place
Related Past Papers
Related Tutorials
Crash report