6.1 Give TWO ways in which sensitive data can be protected…

6.1 Give TWO ways in which sensitive data can be protected, besides restricting access to the data with passwords. (2) 6.2 Study the image attached below. Keeping in mind the principles of user-friendly designs, mention TWO errors that were made when this website was designed. Right click on the button and choose the “Open in new tab” option. (2) 6.3 Why would an author’s name not be enough to consider a source trustworthy? (1) An Internet search returned a link from an advertiser at the top of the set of results. 6.4  Give TWO  reasons why it may not be a good idea to follow this link.  (2)

Die leerders wil ‘n Toep (app) ontwikkel wat mense kan gebru…

Die leerders wil ‘n Toep (app) ontwikkel wat mense kan gebruik om voorvalle soos stropery aan te meld sodra dit gebeur. Hulle wil op die gemeenskap staatmaak om die projek te finansier. 10.15 Noem TWEE nadele van “skarefinansiering” vir die mense uit die gemeenskappe wat geld bydra. (2) 10.16 Watter tipe tegnologie sal mense gebruik om die presiese ligging van ‘n voorval te bepaal en aan te meld wat hulle dalk gesien gebeur het? (1) 10.17 Watter tipe inligting bied ‘n pin op ‘n kaart in ‘n kaartdiens-app, soos Google Maps? (1)