1.

Define ICT and explain its significance in modern society

2.

Describe the difference between computer hardware and software.

3.

          Identify the key milestones in the history of computers.

4.

Discuss the role of the Internet in global communication.

5.

Compare and contrast mainframe computers and supercomputers.

6.

      Analyze the impact of mobile computing on everyday life.

7.

Evaluate the benefits and challenges of cloud computing.

8.

Illustrate how a CPU functions within a computer system.

9.

Summarize the evolution of personal computers from the 1970s to the present.

10.

Outline the primary functions of ICT in business environments.

11.

Classify the different types of storage devices and their uses.

12.

Critically assess the impact of ICT on globalization.

13.

Explain how embedded computers are utilized in everyday devices.

14.

            Explain the concept of digital literacy and its importance.

15.

Describe the different types of data and provide examples for each type

16.

Explain the concept of data privacy and discuss its importance in data management

17.

Compare the roles of data security and data control in safeguarding information systems

18.

Discuss the impact of sophisticated cyber threats on data security

19.

Explain how encryption helps in protecting data during transmission

20.

Describe the role of data governance in ensuring data security and control

21.

Identify the challenges of cloud security and propose solutions to address these challenges

22.

Identify and analyze common security threats in an automated environment

23.

Define data security and explain its significance in an automated environment:

24.

List the main components of a computer and their functions

25.

Examine the role of ICT in modern education and training.

26.

Discuss the significance of convergence in ICT

27.

Explain the concept of interactivity in digital technologies.

28.

Identify the various output devices used in computer systems.

29.

Discuss the functions of automation in ICT.

30.

Describe the types of input devices and their purposes.

31.

Explain the classification of computers based on size and purpose.

32.

Analyze the technological advancements that led to the development of the Internet.

33.

Evaluate the role of workstations in professional environments.

34.

Define encryption and its role in data security

35.

Evaluate the effectiveness of different access control mechanisms

36.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA

37.

Assess the security risks introduced by big data and IoT devices

38.

Describe the control measures used to mitigate malware threats

39.

Examine the various types of social engineering threats and suggest preventive measures

40.

Outline the steps involved in developing an incident response plan

41.

Critique the role of security awareness training in preventing phishing attacks

42.

Analyze the impact of insider threats on data security and suggest mitigation strategies

43.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures

44.

Discuss the legal implications of data breaches for organizations

45.

Illustrate the process of applying security patches and updates to prevent zero-day exploits

46.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks

47.

Define cybercrime and list various types of computer crimes with examples

48.

Examine the importance of compliance management in data control

49.

Outline the classification of security threats and provide examples for each category

50.

Define a word processor and explain its primary functions

51.

Explain the process of text wrapping in a word processor

52.

Identify the components of a character in a text document

53.

Compare and contrast a spreadsheet and a database in terms of their functions and uses

54.

Discuss the role of an operating system in managing hardware resources

55.

Analyze the importance of memory management in an operating system

56.

Outline the steps involved in creating a table in a word processor

57.

Evaluate the effectiveness of spell-checking and grammar-checking tools in word processing software

58.

Summarize the key features of spreadsheet software

59.

Demonstrate how to create a formula in a spreadsheet to calculate the sum of a range of cells

60.

Distinguish between DML and DDL in the context of database manipulation

61.

Describe the normalization process in database design and its significance

62.

Explain the role of indexing in data retrieval and its impact on database performance

63.

Illustrate the process of inserting data into a database table using SQL

64.

Assess the security mechanisms implemented by an operating system to protect data

65.

Outline the steps involved in configuring an IP address for a new device on a network

66.

Compare different types of user interfaces provided by operating systems

67.

Describe how query optimization techniques can improve database performance

68.

Explain the concept of data caching and its benefits for query performance

69.

Discuss the importance of transaction management in maintaining database integrity

70.

Analyze the impact of parallel processing on data retrieval in large datasets

71.

Illustrate how to create a chart in spreadsheet software using a dataset

72.

Evaluate the role of device drivers in the operation of I/O devices in an operating system

73.

Summarize the key components and functionalities of spreadsheet software for data analysis

74.

Define the term "Internet" and explain its importance in the modern workplace

75.

Identify the key elements found on a typical web page

76.

Describe how email functions as a communication tool in the workplace

77.

Explain the role of HTTP in accessing web resources

78.

Illustrate how a web browser functions and list three popular examples

79.

Discuss the purpose and benefits of an extranet for businesses

80.

Describe the process of information processing in ICT.

81.

Analyze the importance of proper network configuration in maintaining a secure and efficient network

82.

Compare and contrast the different network topologies (star, bus, ring, mesh)

83.

Summarize the functions of a router and a switch in a computer network

84.

Evaluate the impact of the World Wide Web on global information access

85.

List and describe three key features of the Internet that enhance workplace productivity

86.

Explain the process of subnetting and its advantages in network management

87.

Describe how DNS configuration facilitates domain name resolution

88.

Discuss the importance of security configuration in protecting network resources

89.

Explain the role of wireless configuration in modern network setups

90.

Analyze the benefits of using cloud-based collaboration tools in the workplace

91.

Identify the main uses of the Internet in the fields of education and research

92.

Compare the advantages and disadvantages of remote work enabled by the Internet

93.

Describe the process of setting up a secure email system using SSL/TLS

94.

Explain the concept of email attachments and list three common types

95.

Discuss the significance of email protocols such as SMTP, IMAP, and POP3

96.

Illustrate how email filters and labels can improve email management

97.

Identify the key functions of the Internet that support e-commerce

98.

Summarize the ways in which social networking platforms facilitate communication

99.

Explain how the Internet fosters innovation and entrepreneurship

100.

Describe the process of setting up a firewall and its role in network security

101.

Analyze the impact of the Internet on freedom of expression and its limitations in certain regions

102.

Compare the roles of hubs, switches, and routers in a computer network

103.

Evaluate the effectiveness of current methods used to secure email communication

104.

Define the term "Data Publishing" and explain its importance in desktop publishing

105.

Describe the traditional and modern methods of publishing

106.

Explain the role of a typesetter in both traditional and digital publishing contexts

107.

Compare an electronic page and a virtual page, highlighting their differences

108.

Outline the key components involved in desktop publishing

109.

Identify three popular page layout software used in desktop publishing

110.

Discuss the importance of text formatting in desktop publishing

111.

Illustrate the steps involved in creating a new publication in desktop publishing software

112.

Analyze the role of templates and master pages in maintaining consistency in a document

113.

Evaluate the significance of color management in desktop publishing

114.

Summarize the process of opening, saving, and closing files in desktop publishing software

115.

List five tools commonly found in desktop publishing software and describe their functions

116.

Justify the use of grids and guides in determining page layout

117.

Examine the importance of content hierarchy in document design

118.

Propose strategies for using white space effectively in a publication

119.

Demonstrate how to insert and format text frames in a desktop publishing document

120.

Distinguish between importing and exporting text in desktop publishing software

121.

Critique the advantages and disadvantages of object linking versus object embedding

122.

Describe the steps involved in designing a publication from start to finish

123.

Describe the purpose of a word document and list three common file formats used

124.

Illustrate how text can be formatted in a word processor using examples.