(4a)- Be adaptable-Be detail - oriented- Work collaboratively- Communicate well
(4b)i Nigeria is a computer society.(NCS)
ii Nigeria Internet Group(NIG)
iii Computer ProfessionalsRegistration Council of Nigeria (CPCN).iv Nigeria Internet Exchange (NIA)
(4c)WiFi - Wireless FidelityGUI - Graphical User Interface
3a) application package
Bundle of two or more computer programs that
together address a specific business need. For
example, an 'illustration package' might include a
drawing program, photograph manipulation
program, page setting program, and a color
matching and output control (printing) program.
4a) Data security refers to protective digital privacy
measures that are applied to prevent
unauthorized access to computers, databases
and websites. Data security also protects data
from corruption. Data security is the main
priority for organizations of every size and
genre.
Data security is also known as information
security (IS) or computer security.
4ai Examples of formal risk assessment techniques and
measurements include conditional value at risk-cVaR
(used by portfolio managers to reduce the likelihood
of incurring large losses); loan-to-value ratios (used
by mortgage lenders to evaluate the risk of lending
funds to purchase a particular property); and credit
analysis (used by lenders to analyze a potential
client's financial data to determine whether to lend
money and if so, how much and at what interest
rate).
No comments:
Post a Comment