Upload
wafiuddin94
View
214
Download
0
Embed Size (px)
Citation preview
8/6/2019 toccwla1s02
1/2
8/6/2019 toccwla1s02
2/2
TOC.CW.LA1.AS02.1
SCORE CRITERIA EVIDENCE NOTE
4. Display cooperation.a. Write the names of
group members.b. Verbal verification
from groupmembers ORassessorsobservation.
Complete TWO to THREEtasks.
5. Virus (Trojan Horse, SalamiAttack)
6. Hacking7. Security Measures (Biometrics,
Authentication)
Suggested presentation duration: 5minutes
Values: Cooperate Responsible
0
1. Locate information frommore than one source.
Write the number ofsources referred.
2. Present the informationin 5 to 10 slides.Write the number ofslides used.
3. Presentation includes:a. Topicb. Contentc. Conclusiond. Sources of
referenceSubmit a soft copy orhard copy of thepresentation.
4. Display cooperation.a. Write the names of
group members.b. Verbal verification
from groupmembers ORassessorsobservation.
Complete any ONE task.
Completed ACF.CW.LA1.S02.1
ANDa soft copy and/orhard copy of the
presentation.
Candidates locate information in groupsof 2 4 but must prepare and present
slides individually .
Source of information can be fromwebsites, books, magazines ornewspapers etc.
Choose ONE of the following topics:1. Copyright and Piracy from Moral
and Legal Standpoints.2. Lack of Security and its Effects on
Industry/Economy/ Government.3. Malaysian Cyber Law, Electronic
Government Law.4. Phishing5. Virus (Trojan Horse, Salami
Attack)6. Hacking7. Security Measures (Biometrics,
Authentication)
Suggested presentation duration: 5minutes
Values: Cooperate Responsible