Get premium membership and access questions with answers, video lessons as well as revision papers.
(i) There are no standard laws to govern all information systems world wide.
(ii) It is difficult to control or ensure the information or content to be posted on the internet.
(iii) The availability of sophisticated software on the internet to hack or spy on other systems.
(iv) Lack of proper laws, regulations and policies governing information systems usage and security.
(v) lack of clear legal framework on how to mete punitive measures to offenders.
(vi) Difficulty in apprehending the internet offenders.
maurice.mutuku answered the question on April 17, 2018 at 06:30
- What measures are outlined in the data protection Act of 1998?(Solved)
Give measures outlined in the data protection Act of 1998.
Date posted: April 17, 2018. Answers (1)
- Why are laws important to govern information and information systems?(Solved)
Explain why laws are important to govern information and information systems.
Date posted: April 17, 2018. Answers (1)
- How would you prevent/ minimize piracy?(Solved)
Explain how you would prevent/ minimize piracy.
Date posted: April 17, 2018. Answers (1)
- How can you detect and protect a computer against crimes?(Solved)
Explain ways of detecting and protecting a computer against crimes.
Date posted: April 17, 2018. Answers (1)
- Give six reasons for using computer based advertising in an organisation(Solved)
Give six reasons for using computer based advertising in an organisation.
Date posted: April 16, 2018. Answers (1)
- What are the examples of computer crimes?(Solved)
List and explain briefly examples of computer crimes.
Date posted: April 16, 2018. Answers (1)
- Define the term computer software(Solved)
Define the term computer software.
Date posted: April 16, 2018. Answers (1)
- How can theft lead to loss of data in a computer systems and what control measures can be put in place to curb this problem?(Solved)
Explain how theft can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted: April 16, 2018. Answers (1)
- How can natural calamities lead to loss of data in a computer systems and what control measures can be put in place to curb this...(Solved)
Explain how natural calamities can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted: April 16, 2018. Answers (1)
- How can computer hardware and software faults be seen as a threat to computer systems and what control measures can be enforced to curb this...(Solved)
Explain how computer hardware and software faults can be seen as a threat to computer systems. Also give the control measure(s) that can be enforced to curb this problem.
Date posted: April 14, 2018. Answers (1)
- How can unauthorized access lead to a threat to computer systems and what control measure can be put in place to curb this vice?(Solved)
Discuss how unauthorized access can lead to a threat to computer systems and what control measure can be put in place to curb this vice.
Date posted: April 14, 2018. Answers (1)
- How can you prevent viruses from attacking your computer?(Solved)
Give ways of preventing viruses from attacking your computer.
Date posted: April 14, 2018. Answers (1)
- In what ways do viruses spread from one computer to another?(Solved)
Give ways in which viruses spread from one computer to another.
Date posted: April 14, 2018. Answers (1)
- What are the symptoms of a computer infected by viruses?(Solved)
List the symptoms of a computer infected by viruses.
Date posted: April 14, 2018. Answers (1)
- What are the types of computer viruses?(Solved)
Highlight the types of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What are the common properties of computer viruses?(Solved)
Discuss the common properties of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What is a computer virus?(Solved)
Define computer virus.
Date posted: April 14, 2018. Answers (1)
- What are the main security threats to data?(Solved)
Highlight the main security threats to data.
Date posted: April 14, 2018. Answers (1)
- What is confidential data?(Solved)
Define confidential data.
Date posted: April 14, 2018. Answers (1)
- What is private data?(Solved)
Define private data.
Date posted: April 14, 2018. Answers (1)