toccwla1s02

Embed Size (px)

Citation preview

  • 8/6/2019 toccwla1s02

    1/2

  • 8/6/2019 toccwla1s02

    2/2

    TOC.CW.LA1.AS02.1

    SCORE CRITERIA EVIDENCE NOTE

    4. Display cooperation.a. Write the names of

    group members.b. Verbal verification

    from groupmembers ORassessorsobservation.

    Complete TWO to THREEtasks.

    5. Virus (Trojan Horse, SalamiAttack)

    6. Hacking7. Security Measures (Biometrics,

    Authentication)

    Suggested presentation duration: 5minutes

    Values: Cooperate Responsible

    0

    1. Locate information frommore than one source.

    Write the number ofsources referred.

    2. Present the informationin 5 to 10 slides.Write the number ofslides used.

    3. Presentation includes:a. Topicb. Contentc. Conclusiond. Sources of

    referenceSubmit a soft copy orhard copy of thepresentation.

    4. Display cooperation.a. Write the names of

    group members.b. Verbal verification

    from groupmembers ORassessorsobservation.

    Complete any ONE task.

    Completed ACF.CW.LA1.S02.1

    ANDa soft copy and/orhard copy of the

    presentation.

    Candidates locate information in groupsof 2 4 but must prepare and present

    slides individually .

    Source of information can be fromwebsites, books, magazines ornewspapers etc.

    Choose ONE of the following topics:1. Copyright and Piracy from Moral

    and Legal Standpoints.2. Lack of Security and its Effects on

    Industry/Economy/ Government.3. Malaysian Cyber Law, Electronic

    Government Law.4. Phishing5. Virus (Trojan Horse, Salami

    Attack)6. Hacking7. Security Measures (Biometrics,

    Authentication)

    Suggested presentation duration: 5minutes

    Values: Cooperate Responsible