(a) State two problems associated with uncontrolled access to the internet by the students:
- Students might access websites that are not educational or age-appropriate.
- Unrestricted access may lead to malware infections or unauthorized access to sensitive data.
(ii) How can the problems stated in 4a(i) be prevented?
- Use of content filtering software to block access to inappropriate sites.
- Implementing network monitoring tools to track and limit students' online activities.
(b) Give one reason for users' authentication before access to the system is granted:
Authentication ensures that only authorised users can access the system, thereby protecting sensitive data and preventing unauthorised use.
(c) To use the mIS, a staff is expected to log in using a registered username and password.
Table below shows login activities and the login steps to the MIS. Specify te correct order or steps in the login process in column Y using the letter A-E attached to the login activities in column X.
Table below shows login activities and the login steps to the MIS. Specify te correct order or steps in the login process in column Y using the letter A-E attached to the login activities in column X.
Login process steps: