Uploaded by Nomfundo Ntopo

DIT511 Assignment

advertisement
Nomfundo Ntopo 402411277
FACULTY OF INFORMATION TECHNOLOGY
Information systems 511
1ST SEMESTER ASSIGNMENT
Name & Surname:_ NOMFUNDO NTOPO
ITS No: 402411277
Qualification: DIPLOMA IN INFORMATION SYSTEMS
information systems
Semester: 1 Module Name:
Date Submitted:
I’m ASSESSMENT CRITERIA
MARK
ALLOCATION
EXAMINER
MARKS
MODERATOR
MARKS
MARKS FOR CONTENT
QUESTION ONE
30
QUESTION TWO
QUESTION THREE
30
30
TOTAL
90
MARKS FOR TECHNICAL ASPECTS
TABLE OF CONTENTS
Accurate numbering according to the numbering
in text and page numbers.
LAYOUT AND SPELLING
Font – Calibri 12
Line Spacing – 1.0
Margin should be justified.
REFERENCES
According to the Harvard Method
2
TOTAL
10
TOTAL MARKS FOR ASSIGNMENT
100
3
5
Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner:
Signature of Moderator:
1
Page 1 of 13
Nomfundo Ntopo 402411277
2
Page 2 of 13
Nomfundo Ntopo 402411277
Table of contents
FACULTY OF INFORMATION TECHNOLOGY ................................................... 1
Table of contents .................................................................................................... 3
QUESTION 1 ............................................................................................................ 4
1.1 ...................................................................................................................... 4
1.2 ...................................................................................................................... 5
Question 2 .............................................................................................................. 9
2.1 ...................................................................................................................... 9
2.2 .................................................................................................................... 11
Question 3 ............................................................................................................ 12
Referencing .......................................................................................................... 13
3
Page 3 of 13
Nomfundo Ntopo 402411277
QUESTION 1
1.1
a. Macro viruses: These viruses infect documents or files that have macros, such as Word
or Excel documents. They can spread via email attachments or shared papers.
Script viruses: These viruses are written in scripting languages such as JavaScript and
VBScript. They can infect files or network shares and propagate through a variety of
channels, including malicious websites and infected scripts.
Polymorphic viruses: they are difficult to identify and eliminate because their code changes
each time, they infect a new file. They can quickly propagate over a network, causing severe
damage.
Boot sector viruses: they infect the boot sector of a computer's hard disk, allowing them to
be loaded into memory when the computer is turned on. They can propagate to other PCs
on the network.
Companion viruses: they attach themselves to normal file names on the network, and when
the file is opened, the virus runs. They can quickly spread through shared files and folders
within the business.
b. File-infecting viruses operate by attaching themselves to executable files like .exe
and .com. When a user runs an infected file, the virus code is executed, which can then
infect other executable files on the system. This allows the virus to spread and could
damage a user's files or system. File-infecting viruses can also use hidden strategies to
prevent detection, such as changing file sizes or timestamps. They may also include
strategies for evading antivirus software or security measures. Once infected, the virus can
do harmful actions such as destroying files, stealing data, or causing system crashes. Some
4
Page 4 of 13
Nomfundo Ntopo 402411277
file-infecting viruses may also include a payload that activates at a specific time or under
certain conditions, causing additional damage to the system.
c. Put in place strong security measures: Firewalls, antivirus programs, and intrusion
detection systems are examples of strong cybersecurity measures that should be in place in
organizations.
Update systems and software frequently: In order to defend against known vulnerabilities,
make sure that all systems and software are updated frequently with the newest security
patches.
Perform routine security assessments: To find and fix any vulnerabilities, evaluate the
organization's security posture on a regular basis using penetration tests and vulnerability
scans.
Employee education and training: Provide cybersecurity best practices to staff members,
such as caution when opening attachments from unfamiliar sources or clicking on dubious
websites.
Put access controls in place: Restrict access to important information and systems to people
who truly require it and implement robust authentication techniques like multi-factor
authentication.
1.2
a. The term "technology addiction" in the context of the workplace describes the excessive
and obsessive use of devices like computers, smartphones, and social media that impairs a
person's capacity to carry out their job responsibilities. During working hours, this addiction
may show up in behaviors like playing games on electronic devices, browsing social media,
or continuously checking emails.
Unchecked addiction to technology can have detrimental effects on the general productivity
of a business as well as the wellbeing of its employees. Among the possible outcomes are:
•
•
Employees who are hooked to technology may devote a large amount of time to
non-work-related activities, resulting in lower productivity and an inability to meet
deadlines. This can lead to postponed initiatives, lower-quality work, and, ultimately,
decreased organizational performance.
Employees may experience higher stress and burnout as a result of their constant
connection to technology. Constant notifications, emails, and texts can make it
5
Page 5 of 13
Nomfundo Ntopo 402411277
•
•
impossible for employees to completely detach from work, resulting in poor worklife balance and detrimental effects on mental health.
Impaired decision-making: Technology addiction can affect an employee's capacity
to focus and concentrate on critical activities, resulting in mistakes of judgment and
poor decision-making. This can lead to blunders, misunderstandings, and, eventually,
poor business judgments.
Negative influence on relationships: Excessive use of technology at work can harm
relationships with coworkers and bosses. Constantly using electronic gadgets might
lead to fewer face-to-face interactions, misunderstandings, and, eventually, strained
professional relationships.
b.
❖ Regularly check employees' workloads and deadlines to ensure they are not taking
on more than they are capable of handling.
❖ Provide training and resources for good technology management, including as time
management and stress management tactics. Encourage staff to take breaks from
their devices and focus on self-care.
❖ Create a supportive work atmosphere in which employees feel comfortable raising
concerns about technological overload. Encourage open communication and provide
resources for employees to seek assistance as required.
❖ Use technology tools to monitor employees' work habits, like as tracking software
that measures productivity and digital device usage. This can help identify patterns
of overuse.
c.
1. Provide training and education on how to effectively manage technology use and set
boundaries, such as establishing designated times for checking emails or limiting use
of technology after working hours.
2. Encourage employees to take regular breaks from technology, such as incorporating
mindfulness practices or encouraging physical exercise during the workday.
3. Implement policies that support work-life balance, such as flexible work hours or
remote work options, to help employees better manage their time and
responsibilities.
4. Encourage open communication and feedback from employees on how technology is
impacting their work-life balance, and be willing to make adjustments as needed.
6
Page 6 of 13
Nomfundo Ntopo 402411277
5. Promote a culture of respect for personal time by setting clear expectations for
communication outside of work hours and encouraging employees to disconnect
when they are not working.
6. Provide resources and support for employees to prioritize self-care and well-being,
such as access to mental health resources or wellness programs.
7. Lead by example by modeling healthy technology habits and demonstrating the
importance of work-life balance within the organization.
d.
❖ Surveys and assessments: Organizations can measure the effectiveness of
interventions by conducting pre and post-intervention surveys or assessments to
gather feedback from employees on their experience with technology overload and
addiction. These surveys can include questions about the impact of the intervention
on their well-being, productivity, and overall satisfaction.
❖ Tracking productivity metrics: Organizations can track productivity metrics before
and after implementing interventions aimed at reducing technology overload and
addiction. This can include tracking employee output, meeting deadlines, and
accomplishing goals to assess any changes in productivity levels.
❖ Employee retention and turnover rates: Organizations can assess the impact of
interventions by monitoring employee retention and turnover rates. If employees
are less likely to leave the organization or are more satisfied with their work after the
intervention, it may indicate that the intervention has been effective in improving
employee well-being.
❖ Absenteeism and presenteeism rates: Monitoring absenteeism and presenteeism
rates can also provide insights into the impact of interventions on employee wellbeing. If employees are taking fewer sick days or are more engaged and present at
work, it may indicate that the intervention has been successful in addressing
technology overload and addiction.
❖ Employee feedback and testimonials: Organizations can also gather qualitative
feedback from employees through focus groups, interviews, or testimonials to
understand their experience with the intervention and how it has impacted their
well-being, satisfaction, and productivity.
Key indicators to consider when assessing the impact of interventions on employee
satisfaction, well-being, and overall productivity may include:
❖ Employee stress levels
❖ Work-life balance
7
Page 7 of 13
Nomfundo Ntopo 402411277
❖ Job satisfaction
❖ Engagement and motivation
❖ Mental health and burnout rates
❖ Collaboration and communication within teams
❖ Quality of work and perf
8
Page 8 of 13
Nomfundo Ntopo 402411277
Question 2
2.1
PLEASE COMPLETE ALL INFORMATION REQUESTED
IN PRINT (PAGES 1-5). EXCEPT SIGNATURE
NOTE: APPLICATIONS MAY BE TESTED FOR ILLEGAL DRUGS
Date: 22 Febuauary 2024
Name: Ntopo Nomfundo
Last
First
Middle
Maiden
Present Address: 73 Ksasi Crescent, Protea Glen ext 20, Gauteng, 1819
Number
Street
city
province
How long: 5 years
postal code
Social Security No:56768
Telephone: 0813457865
If under 18, please list age:
Days/Hours Available to
Work:
No Prof_____ Thurs________
Mon___x_____
Fri_____x_____
Tue________ Sat_________
Wed_____x__
Sun_________
Position Applied For : Technical Support
Salary Desired: R45 000
How many hours can you work weekly:
Can you work night?
Employment Desired:
❑ FULL TIME ONLY
❑ PART TIME ONLY
❑ FULL-OR PART-TIME
When avaible for work? End of February 2024
Education and other information
9
Page 9 of 13
Nomfundo Ntopo 402411277
Type of school
Name of school
Location(complete
mail address)
No.of years
completed
High school
Florida park
high school
45 german
street,
rordepoort.
Gauteng,1547
2019
Major and
degree
10
Page 10 of 13
Nomfundo Ntopo 402411277
2.2
11
Page 11 of 13
Nomfundo Ntopo 402411277
Question 3
2024 Budget Statistics.xlsx
12
Page 12 of 13
Nomfundo Ntopo 402411277
Referencing
•
•
•
•
•
Alli. J. 2006.Symantec. (n.d.). Script viruses. Retrieved from
https://www.symantec.com/security-center/writeup
Zor, P. (2005). The Art of Computer Virus Research and Defense. Prentice Hall.
Shu, L. L., & Gino, F. (2018). Mentalizing Inhibits the Trust Gap in the United States.
Psychological Science, 29(4), 555-568.
National Institute of Standards and Technology (NIST). (2018). Computer Security
Resource Center. Retrieved from https://csrc.nist.gov/
International Organization for Standardization (ISO). (2013). Information technology
— Security techniques — Information security management systems —
Requirements. ISO/IEC 27001:2013
13
Page 13 of 13
Download