Preview

ITE4103 Assignment 201415 Sem5

Satisfactory Essays
Open Document
Open Document
372 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ITE4103 Assignment 201415 Sem5
Assignment (2014/15) – Sem5

ITE4103 IT Professionalism

HONG KONG INSTITUTE OF VOCATIONAL EDUCATION
Assignment

/ 40

1. List 4 reasons why IT has great impacts on ethics in modern society. For each of the reason, give
ONE example of the problem/violation. (12%)

2. a) What is ethical hacking?

(2%)

b) In additional to technical competency, list TWO basic attributes of an ethical hacker.

(4%)

c) List TWO (administrative) steps that the ethical hacker need to do before committing the hacking. (4%)

3. As an IT professional, it is necessary take steps to prevent computer crime at personal and corporate level respectively.
At personal level, give 3 examples (3%)

© VTC 2014

Page 1 of 2

Assignment (2014/15) – Sem5

ITE4103 IT Professionalism

At corporate level, give THREE examples (3%)
(Hints: focus on activities to strengthen the human behavior which is the also known as the weakest link of the IT system.)

4. The followings are methods that help to establish an environmental friendly office. Select two examples in each method. (12%)
General Methods
Example(s)
A Create less waste by conserving
1 Recycle all used plastic, waste papers, toner and natural resource ink-cartridge, etc.
2 Switch off all unused lighting or electrical equipment, e.g. desktop PC in office, etc
B Adopt waste recycle/reuse practice
3 Buy and use recycling toners and cartridges for copiers or printers.
4 Set air-conditioning temperature at 25.5C.
C Adopt pollution preventive measures
5 Everyone receives awareness training regularly.
6 Buy from environmental friendly vendors, eg envelope made from recycle paper
D Environment Procurement
7 Use environmental friendly office materials and stop using asbestos.
8 Organise of yearly awareness events; e.g. tree plantation day and its poster has to be posted in office. E Increase general awareness of
9 Use less paper, use less air-conditioning, use more environment of all staff emails instead of paper memo.
10 Strictly stop all smoking in office

You May Also Find These Documents Helpful

  • Better Essays

    On October 1, 2014, a 56 year old man, Mr. Brown, came in for his follow-up appointment to talk about his cholesterol panel. Mr. Brown’s cholesterol levels are not within healthy standards and he needs to change his life style before his health diminishes. Mr. Brown likes to eat and hates to exercise. I am going to show him his cholesterol levels so that he can see what he is doing to his body. If he does not get his cholesterol levels where they need to be his arteries might get so clogged up that he could have a heart attack or stroke. He needs to do some preventive medicine on his own with a little help from me and my staff.…

    • 1065 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    3. Analyze or determine the year of release for all CD’s or DVD’s in collection.…

    • 137 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Exam Paper Afin253

    • 3460 Words
    • 14 Pages

    SEAT NUMBER: ……….… ROOM: .………………. FAMILY NAME.………….....…………………………. This question paper must be returned. Candidates are not permitted to remove any part of it from the examination room. OTHER NAMES…………….…………………..…….. STUDENT NUMBER………….………..……………..…

    • 3460 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Best Essays

    integrative in that students use knowledge and tools from all functional areas of business to develop a…

    • 2652 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    Name: ________________________ Class: ___________________ Date: __________ CS11-Online-Chapter09 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Computer crime is sometimes referred to as ____. a. hacking c. b. cybercrime d.…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    - people leave pens, notebooks and another stationery somewhere and take an effort to find it when they need it so it’s easier to take a new one…

    • 274 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    An explanation of the processes used by own work setting or service that must comply with legislation that covers data protection, information handling and sharing.…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?…

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 201 Level 2

    • 504 Words
    • 3 Pages

    Share information, ask and reply to questions, keep up to date of any changes, feedback, build team work, be professional, makes a better atmosphere, better customer service and may prevent mistakes.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    iah201 assignment5

    • 1366 Words
    • 5 Pages

    After the applicants have submitted their work, the public will vote on what pieces they like best through a website. The website will have three categories that the applicant can identify their project with. This website will allow them to pick their three favorite pieces from each category. Once the votes are in, the top five applicants will appear before a panel made up of MSU faculty. Applicants will give a one minute presentation explaining the process they went through to create their piece and then answer questions from the faculty. The winner will be given an award of one thousand dollars, be featured in a State News article, and showcase his/her work at the Eli and Edythe Broad Art Museum and…

    • 1366 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A storysack is a large cloth bag containing a children's picture book with supporting materials to stimulate…

    • 1684 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ACC 497 Final Exam

    • 2281 Words
    • 11 Pages

    16) What would be the best explanation for the absence of complete information on computer crime?…

    • 2281 Words
    • 11 Pages
    Good Essays