1.

Compare the roles of data security and data control in safeguarding information systems.

2.

Discuss the impact of sophisticated cyber threats on data security.

3.

Define encryption and state its role in data security.

4.

Evaluate the effectiveness of different access control mechanisms.

5.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA.

6.

Assess the security risks introduced by big data and IoT devices.

7.

Describe the control measures used to mitigate malware threats.

8.

Examine the various types of social engineering threats and suggest preventive measures.

9.

Outline the steps involved in developing an incident response plan.

10.

Critique the role of security awareness training in preventing phishing attacks.

11.

Analyze the impact of insider threats on data security and suggest mitigation strategies.

12.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures.

13.

Outline the classification of security threats and provide examples for each category.

14.

Evaluate the effectiveness of spell-checking and grammar-checking tools in word processing software.

15.

Outline the steps involved in configuring an IP address for a new device on a network.

16.

Illustrate the steps involved in creating a new publication in desktop publishing software.

17.

Define ICT and explain its significance in modern society.

18.

Describe the difference between computer hardware and software.

19.

Explain the concept of digital literacy and its importance,

20.

Identify the key milestones in the history of computers.

21.

Discuss the role of the Internet in global communication.

22.

Discuss the significance of convergence in ICT.

23.

Compare and contrast mainframe computers and supercomputers.

24.

Analyze the impact of mobile computing on everyday life.

25.

Evaluate the benefits and challenges of cloud computing.

26.

Illustrate how a CPU functions within a computer system.

27.

Classify the different types of storage devices and their uses.

28.

Critically assess the impact of ICT on globalization.

29.

Explain how embedded computers are utilized in everyday devices.

30.

List the main components of a computer and their functions.

31.

Describe the process of information processing in ICT.

32.

Examine the role of ICT in modern education and training.

33.

Explain the concept of interactivity in digital technologies.

34.

Identify the various output devices used in computer systems.

35.

Discuss the functions of automation in ICT.

36.

Describe the types of input devices and their purposes.

37.

Explain the classification of computers based on size and purpose,

38.

Analyze the technological advancements that led to the development of the Internet.

39.

Evaluate the role of workstations in professional environments.

40.

Define data security and explain its significance in an automated environment.

41.

Describe the different types of data and provide examples for each type.

42.

Explain the concept of data privacy and discuss its importance in data management.

43.

Identify and analyze common security threats in an automated environment.

44.

Discuss the legal implications of data breaches for organizations.

45.

Illustrate the process of applying security patches and updates to prevent zero-day exploits.

46.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks.

47.

Define cybercrime and list various types of computer crimes with examples.

48.

Explain how encryption helps in protecting data during transmission.

49.

Describe the role of data governance in ensuring data security and control.

50.

Identify the challenges of cloud security and propose solutions to address these challenges.

51.

Examine the importance of compliance management in data control.

52.

Define a word processor and explain its primary functions.

53.

Describe the purpose of a word document and list three common file formats used.

54.

Explain the process of text wrapping in a word processor.

55.

Identify the components of a character in a text document.

56.

Illustrate how text can be formatted in a word processor using examples.

57.

Compare and contrast a spreadsheet and a database in terms of their functions and uses.

58.

Discuss the role of an operating system in managing hardware resources.

59.

Analyze the importance of memory management in an operating system.

60.

Outline the steps involved in creating a table in a word processor.

61.

Summarize the key features of spreadsheet software.

62.

Demonstrate how to create a formula in a spreadsheet to calculate the sum of a range of cells.

63.

Distinguish between DML and DDL in the context of database manipulation.

64.

Describe the normalization process in database design and its significance.

65.

Explain the role of indexing in data retrieval and its impact on database performance.

66.

Illustrate the process of inserting data into a database table using SQL.

67.

Assess the security mechanisms implemented by an operating system to protect data.

68.

Compare different types of user interfaces provided by operating systems.

69.

Describe how query optimization techniques can improve database performance.

70.

Explain the concept of data caching and its benefits for query performance.

71.

Discuss the importance of transaction management in maintaining database integrity.

72.

Analyze the impact of parallel processing on data retrieval in large datasets.

73.

Illustrate how to create a chart in spreadsheet software using a dataset.

74.

Evaluate the role of device drivers in the operation of I/O devices in an operating system.

75.

Summarize the key components and functionalities of spreadsheet software for data analysis.

76.

Define the term "Internet" and explain its importance in the modern workplace.

77.

Describe how email functions as a communication tool in the workplace.

78.

Explain the role of HTTP in accessing web resources.

79.

Illustrate how a web browser functions and list three popular examples.

80.

Discuss the purpose and benefits of an extranet for businesses.

81.

Identify the key elements found on a typical web page.

82.

Explain the process of subnetting and its advantages in network management.

83.

Analyze the importance of proper network configuration in maintaining a secure and efficient network.

84.

Compare and contrast the different network topologies (star, bus, ring, mesh).

85.

Summarize the functions of a router and a switch in a computer network.

86.

Evaluate the impact of the World Wide Web on global information access.

87.

List and describe three key features of the Internet that enhance workplace productivity.

88.

Describe how DNS configuration facilitates domain name resolution.

89.

Discuss the importance of security configuration in protecting network resources.

90.

Explain the role of wireless configuration in modern network setups.

91.

Analyze the benefits of using cloud-based collaboration tools in the workplace.

92.

Identify the main uses of the Internet in the fields of education and research.

93.

Compare the advantages and disadvantages of remote work enabled by the Internet.

94.

Describe the process of setting up a secure email system using SSL/TLS.

95.

Explain the concept of email attachments and list three common types.

96.

Discuss the significance of email protocols such as SMTP, IMAP, and POP3.

97.

Illustrate how email filters and labels can improve email management.

98.

Identify the key functions of the Internet that support e-commerce.

99.

Summarize the ways in which social networking platforms facilitate communication.

100.

Explain how the Internet fosters innovation and entrepreneurship.

101.

Describe the process of setting up a firewall and its role in network security.

102.

Describe the traditional and modern methods of publishing.

103.

Analyze the impact of the Internet on freedom of expression and its limitations in certain regions.

104.

Compare the roles of hubs, switches, and routers in a computer network.

105.

Evaluate the effectiveness of current methods used to secure email communication.

106.

Define the term "Data Publishing" and explain its importance in desktop publishing.

107.

Explain the role of a typesetter in both traditional and digital publishing contexts.

108.

Compare an electronic page and a virtual page, highlighting their differences.

109.

Outline the key components involved in desktop publishing.

110.

Identify three popular page layout software used in desktop publishing.

111.

Discuss the importance of text formatting in desktop publishing.

112.

Analyze the role of templates and master pages in maintaining consistency in a document.

113.

Evaluate the significance of color management in desktop publishing.

114.

Summarize the process of opening, saving, and closing files in desktop publishing software.

115.

List five tools commonly found in desktop publishing software and describe their functions.

116.

Justify the use of grids and guides in determining page layout.

117.

Examine the importance of content hierarchy in document design.

118.

Propose strategies for using white space effectively in a publication.

119.

Demonstrate how to insert and format text frames in a desktop publishing document.

120.

Distinguish between importing and exporting text in desktop publishing software.