Nomfundo Ntopo 402411277 FACULTY OF INFORMATION TECHNOLOGY Information systems 511 1ST SEMESTER ASSIGNMENT Name & Surname:_ NOMFUNDO NTOPO ITS No: 402411277 Qualification: DIPLOMA IN INFORMATION SYSTEMS information systems Semester: 1 Module Name: Date Submitted: I’m ASSESSMENT CRITERIA MARK ALLOCATION EXAMINER MARKS MODERATOR MARKS MARKS FOR CONTENT QUESTION ONE 30 QUESTION TWO QUESTION THREE 30 30 TOTAL 90 MARKS FOR TECHNICAL ASPECTS TABLE OF CONTENTS Accurate numbering according to the numbering in text and page numbers. LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified. REFERENCES According to the Harvard Method 2 TOTAL 10 TOTAL MARKS FOR ASSIGNMENT 100 3 5 Examiner’s Comments: Moderator’s Comments: Signature of Examiner: Signature of Moderator: 1 Page 1 of 13 Nomfundo Ntopo 402411277 2 Page 2 of 13 Nomfundo Ntopo 402411277 Table of contents FACULTY OF INFORMATION TECHNOLOGY ................................................... 1 Table of contents .................................................................................................... 3 QUESTION 1 ............................................................................................................ 4 1.1 ...................................................................................................................... 4 1.2 ...................................................................................................................... 5 Question 2 .............................................................................................................. 9 2.1 ...................................................................................................................... 9 2.2 .................................................................................................................... 11 Question 3 ............................................................................................................ 12 Referencing .......................................................................................................... 13 3 Page 3 of 13 Nomfundo Ntopo 402411277 QUESTION 1 1.1 a. Macro viruses: These viruses infect documents or files that have macros, such as Word or Excel documents. They can spread via email attachments or shared papers. Script viruses: These viruses are written in scripting languages such as JavaScript and VBScript. They can infect files or network shares and propagate through a variety of channels, including malicious websites and infected scripts. Polymorphic viruses: they are difficult to identify and eliminate because their code changes each time, they infect a new file. They can quickly propagate over a network, causing severe damage. Boot sector viruses: they infect the boot sector of a computer's hard disk, allowing them to be loaded into memory when the computer is turned on. They can propagate to other PCs on the network. Companion viruses: they attach themselves to normal file names on the network, and when the file is opened, the virus runs. They can quickly spread through shared files and folders within the business. b. File-infecting viruses operate by attaching themselves to executable files like .exe and .com. When a user runs an infected file, the virus code is executed, which can then infect other executable files on the system. This allows the virus to spread and could damage a user's files or system. File-infecting viruses can also use hidden strategies to prevent detection, such as changing file sizes or timestamps. They may also include strategies for evading antivirus software or security measures. Once infected, the virus can do harmful actions such as destroying files, stealing data, or causing system crashes. Some 4 Page 4 of 13 Nomfundo Ntopo 402411277 file-infecting viruses may also include a payload that activates at a specific time or under certain conditions, causing additional damage to the system. c. Put in place strong security measures: Firewalls, antivirus programs, and intrusion detection systems are examples of strong cybersecurity measures that should be in place in organizations. Update systems and software frequently: In order to defend against known vulnerabilities, make sure that all systems and software are updated frequently with the newest security patches. Perform routine security assessments: To find and fix any vulnerabilities, evaluate the organization's security posture on a regular basis using penetration tests and vulnerability scans. Employee education and training: Provide cybersecurity best practices to staff members, such as caution when opening attachments from unfamiliar sources or clicking on dubious websites. Put access controls in place: Restrict access to important information and systems to people who truly require it and implement robust authentication techniques like multi-factor authentication. 1.2 a. The term "technology addiction" in the context of the workplace describes the excessive and obsessive use of devices like computers, smartphones, and social media that impairs a person's capacity to carry out their job responsibilities. During working hours, this addiction may show up in behaviors like playing games on electronic devices, browsing social media, or continuously checking emails. Unchecked addiction to technology can have detrimental effects on the general productivity of a business as well as the wellbeing of its employees. Among the possible outcomes are: • • Employees who are hooked to technology may devote a large amount of time to non-work-related activities, resulting in lower productivity and an inability to meet deadlines. This can lead to postponed initiatives, lower-quality work, and, ultimately, decreased organizational performance. Employees may experience higher stress and burnout as a result of their constant connection to technology. Constant notifications, emails, and texts can make it 5 Page 5 of 13 Nomfundo Ntopo 402411277 • • impossible for employees to completely detach from work, resulting in poor worklife balance and detrimental effects on mental health. Impaired decision-making: Technology addiction can affect an employee's capacity to focus and concentrate on critical activities, resulting in mistakes of judgment and poor decision-making. This can lead to blunders, misunderstandings, and, eventually, poor business judgments. Negative influence on relationships: Excessive use of technology at work can harm relationships with coworkers and bosses. Constantly using electronic gadgets might lead to fewer face-to-face interactions, misunderstandings, and, eventually, strained professional relationships. b. ❖ Regularly check employees' workloads and deadlines to ensure they are not taking on more than they are capable of handling. ❖ Provide training and resources for good technology management, including as time management and stress management tactics. Encourage staff to take breaks from their devices and focus on self-care. ❖ Create a supportive work atmosphere in which employees feel comfortable raising concerns about technological overload. Encourage open communication and provide resources for employees to seek assistance as required. ❖ Use technology tools to monitor employees' work habits, like as tracking software that measures productivity and digital device usage. This can help identify patterns of overuse. c. 1. Provide training and education on how to effectively manage technology use and set boundaries, such as establishing designated times for checking emails or limiting use of technology after working hours. 2. Encourage employees to take regular breaks from technology, such as incorporating mindfulness practices or encouraging physical exercise during the workday. 3. Implement policies that support work-life balance, such as flexible work hours or remote work options, to help employees better manage their time and responsibilities. 4. Encourage open communication and feedback from employees on how technology is impacting their work-life balance, and be willing to make adjustments as needed. 6 Page 6 of 13 Nomfundo Ntopo 402411277 5. Promote a culture of respect for personal time by setting clear expectations for communication outside of work hours and encouraging employees to disconnect when they are not working. 6. Provide resources and support for employees to prioritize self-care and well-being, such as access to mental health resources or wellness programs. 7. Lead by example by modeling healthy technology habits and demonstrating the importance of work-life balance within the organization. d. ❖ Surveys and assessments: Organizations can measure the effectiveness of interventions by conducting pre and post-intervention surveys or assessments to gather feedback from employees on their experience with technology overload and addiction. These surveys can include questions about the impact of the intervention on their well-being, productivity, and overall satisfaction. ❖ Tracking productivity metrics: Organizations can track productivity metrics before and after implementing interventions aimed at reducing technology overload and addiction. This can include tracking employee output, meeting deadlines, and accomplishing goals to assess any changes in productivity levels. ❖ Employee retention and turnover rates: Organizations can assess the impact of interventions by monitoring employee retention and turnover rates. If employees are less likely to leave the organization or are more satisfied with their work after the intervention, it may indicate that the intervention has been effective in improving employee well-being. ❖ Absenteeism and presenteeism rates: Monitoring absenteeism and presenteeism rates can also provide insights into the impact of interventions on employee wellbeing. If employees are taking fewer sick days or are more engaged and present at work, it may indicate that the intervention has been successful in addressing technology overload and addiction. ❖ Employee feedback and testimonials: Organizations can also gather qualitative feedback from employees through focus groups, interviews, or testimonials to understand their experience with the intervention and how it has impacted their well-being, satisfaction, and productivity. Key indicators to consider when assessing the impact of interventions on employee satisfaction, well-being, and overall productivity may include: ❖ Employee stress levels ❖ Work-life balance 7 Page 7 of 13 Nomfundo Ntopo 402411277 ❖ Job satisfaction ❖ Engagement and motivation ❖ Mental health and burnout rates ❖ Collaboration and communication within teams ❖ Quality of work and perf 8 Page 8 of 13 Nomfundo Ntopo 402411277 Question 2 2.1 PLEASE COMPLETE ALL INFORMATION REQUESTED IN PRINT (PAGES 1-5). EXCEPT SIGNATURE NOTE: APPLICATIONS MAY BE TESTED FOR ILLEGAL DRUGS Date: 22 Febuauary 2024 Name: Ntopo Nomfundo Last First Middle Maiden Present Address: 73 Ksasi Crescent, Protea Glen ext 20, Gauteng, 1819 Number Street city province How long: 5 years postal code Social Security No:56768 Telephone: 0813457865 If under 18, please list age: Days/Hours Available to Work: No Prof_____ Thurs________ Mon___x_____ Fri_____x_____ Tue________ Sat_________ Wed_____x__ Sun_________ Position Applied For : Technical Support Salary Desired: R45 000 How many hours can you work weekly: Can you work night? Employment Desired: ❑ FULL TIME ONLY ❑ PART TIME ONLY ❑ FULL-OR PART-TIME When avaible for work? End of February 2024 Education and other information 9 Page 9 of 13 Nomfundo Ntopo 402411277 Type of school Name of school Location(complete mail address) No.of years completed High school Florida park high school 45 german street, rordepoort. Gauteng,1547 2019 Major and degree 10 Page 10 of 13 Nomfundo Ntopo 402411277 2.2 11 Page 11 of 13 Nomfundo Ntopo 402411277 Question 3 2024 Budget Statistics.xlsx 12 Page 12 of 13 Nomfundo Ntopo 402411277 Referencing • • • • • Alli. J. 2006.Symantec. (n.d.). Script viruses. Retrieved from https://www.symantec.com/security-center/writeup Zor, P. (2005). The Art of Computer Virus Research and Defense. Prentice Hall. Shu, L. L., & Gino, F. (2018). Mentalizing Inhibits the Trust Gap in the United States. Psychological Science, 29(4), 555-568. National Institute of Standards and Technology (NIST). (2018). Computer Security Resource Center. Retrieved from https://csrc.nist.gov/ International Organization for Standardization (ISO). (2013). Information technology — Security techniques — Information security management systems — Requirements. ISO/IEC 27001:2013 13 Page 13 of 13