Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CALA COMPONET: E

LEARNING AREA: COMPUTER SCIENCE


LEVEL: FORM 4
CALA TYPE: PRACTICAL AND THEORY
SYLLABUS TOPIC: SECURITY AND ETHICS
SUB- TOPIC: COMPUTER CRIME
CALA TITLE: COMPUTER CRIME
COMPETENCIES/SKILLS:
Research, Demonstration, Presentation
BACKGROUND
While computers and the internet have made our lives easier in many ways, it is
unfortunate that some people are using computers to commit crimes and many
people are failing in the traps of these criminals and by the end of the day they will
cry and others commits suicides.

THE CALA:
The CALA had two parts, Part A and Part B and Part C
Part A
 Carry a research of any five different types of computer crimes.(5)
 Research on any two cyber-crime tools being used today(2)

Part B
 Demonstrate on how one can check that he/ she is using a secure website(4)
 Demonstrate how one can create a strong password, firewall and install an
antivirus. (6)
 Submit your screenshots together with your findings presented on any word
processor.
Part C

. What are the measures that might be taken in countering cyber crime.(13)

CALA TIP
 You are reminded to present screenshots that are clear and visible.
 You are also reminded to use the same font throughout your presentation.

You might also like