Você está na página 1de 17

SIMANYENE HIGH SCHOOL

Cyber crime
Cat Application Technology
By :Lindokuhle July
9/15/2017

[Type the abstract of the document here. The abstract is typically a short summary of the contents of the
document. Type the abstract of the document here. The abstract is typically a short summary of the contents of
the document.]
Table of Contents
Introduction……………………………………………………………………………………………………………………….1

Task definition…………………………………………………………………………………………………………………..2

Content.................................................................................................................................3

Findings……………………………………………………………………………………………………………………………4

Conclusion……………………………………………………………………………………………………………………….5

Bibliography…………………………………………………………………………………………………………………….6

Appendices……………………………………………………………………………………………………………………...7
Introduction
Task Definition

Why are you doing the investigation?

I’m doing this investigation because most of tools that are required to bring down the rate by 10
percentage points are in a place. It’s just a matter of robust implementation. Take a country like China,
where four out of five of the programs being used there are not paid for. Many countries have copyright
laws on the books. They have an administrative process for enforcing them. Anyone can bring copyright
infringement cases in the courts there, but there’s just not enough resources applied to make all that
work’’.

What will the focus of your investigation be?

My will be about costs for using pirated software that isn’t supported and the productivity, or capital
costs, that come from a greater prevalence of viruses or security breaches. And there are legal costs
associated with operating in violation of the law. So it’s not as simple as ‘I have free software.’ ’’

How will you go about conducting the investigation, considering the PAT requirements?

The way I will go about conducting my investigation, considering my PAT requirements, I must have
reasons and justification for using software in violation of its end user licensing agreement (EULA).My
first reason:(a) One is the fact that it is extremely easy to do because of the nature of digital media (b)
Another is that users find it prohibitively expensive to purchase proprietary software at the prices set by
its vendors.

Who is the information for (target audience)?

The information are Secret Allies moreover, there is a widely held suspicion that developers of
commercial software themselves are secretly in favour of some extent of copying and use of their
software in violation of end licensing agreements despite their incessant publicity about the supposed
harm that it causes. One reason for this is that such practices are extremely valuable for familiarizing
people with the software who otherwise would not be able to afford it. So my information is for people.

How must you present the information?

I will present my PAT by Software Presentation where I will tell my classmates or teacher that some industry
executives assert that unauthorized copying and use is by far the biggest problem facing the software industry.
This explains that the way they supposed losses are computed is faulty and results in a wild exaggeration .
Focus Question

How can my school and my fellow learners be educated and protect themselves against cybercrime?
Content
Findings

Summary of Gender
18
16
14
12
10
8
6
4
2
0
1 2

Number of Females Number of Male

This is a graph that shows how many males and females I do my questionnaire on them. I have
asked 17 females, which means I have asked 30 in my questionnaire.

Summary of Yes,no,Maybe, and


Sometimes
40

30

20

10

0
Querstion 1 Question 2 Question 3 Question 4 Question 5

Number of Yes Nymber of No


Number of Maybe Number of Sometimes

This graph above shows all the people that have been answer all my questions, Blue are the
people who said “Yes” in my questions, which means the “yes” on my questions are 59.The
green line is “Maybe” this means they are 9.The red is “No” , which means there are 69 no’s on
my questions.
Conclusion
Bibliography
Appendices

Folder Structure
NO QUESTION QUESTION POSSIBLE CATEGORY BIBLIOGRAPHY INFORMATION QUALITY OF INFORMATION FOUND SUMMARY OF
S LEVEL SOURCES INFORMATION FOUND

1. When 1 Yahoo! Author(s) Paul Craig Authority Software Piracy Information found on the
software Exposed internet
piracy could
end in Name of website Science direct.com Currency 2005
Africa?
Date created 2005 Accuracy it is realistic

Date accessed 2005 Objectivity none

URL www.google.co.za Coverage

2. What would 4 Google Author(s) Zander Angelini Authority Digital and Software Information found on
be the best Google
prevention Name of website Currency May 2015
of software
piracy? Date created May 2015 Accuracy it is realistic

Date accessed 20 May 2015 Objectivity None

URL www.yahoo!.com Coverage

3. Why people 2 Wikipedia Author(s) Adrian John Authority Piracy: The Intellectual Information found in the
do software Property Wars magazine
piracy?
Name of website Books.google.com Currency Jan 2010

Date created 15 January 2010 Accuracy Realistic

Publisher University of Chicago Objectivity The page is free bias


Press

City Chicago Coverage More than world-wide


link

4. Would it be 4 Google Author(s) Joe Karaganis


better if we
make Title of magazine Media Piracy in
software Emerging Economies
piracy legal? Date published June 2011

Publisher America Assembly

City Brazil

NO QUESTION QUESTION LEVEL POSSIBLE CATEGORY BIBLIOGRAPHY INFORMATION QUALITY OF INFORMATION FOUND SUMMARY OF
S SOURCES INFORMATION FOUND

5. What if all 3 Yahoo! Author(s) Paul Craig Authority Piracy Exposed Information found on the
the piracies internet
don’t pull out Name of website Books.google.com Currency 2005
in software
piracy? Date created 2005 Accuracy it seems realistic

Date accessed 2005 Objectivity none

URL www.google.co.za Coverage

6. What 1 Google Author(s) Ron Honick Authority Information found on


software Google
piracy Name of website www.google.com Currency
conservation
strategies Date created April 2005 Accuracy it is realistic
does the
world have? Date accessed 12 April 2005 Objectivity None

URL https://www.elsevier.c Coverage


om/books/software-
piracy-
exposed/honick/978-1-
932266-98-6

7. Does the 2 Wikipedia Author(s) Krzysztof Wilczynski Authority Information found in the
world have a magazine
solution for Name of website http://www.piratesinfo. Currency
this com/cpi_Software_Pir
problem? acy_549.asp

Date created 1709 Accuracy Realistic


Publisher Krzysztof Wilczynski Objectivity The page is free bias

City Mexico Coverage More than world-wide


link

8. How can 2 Google Author(s) Eric Kin – Wai Lau


world
authorities Title of magazine Interactions effects in
manage Software Piracy
these
piracies? Date published 4 January 2007

Publisher Business ethics a


European Review

City America
NO. QUESTIONS QUESTION POSSIBLE CATEGORY BIBLIOGRAPHY INFORMATION QUALITY INFORMATION FOUND SUMMARY OF
LEVEL SOURCES INFORMATION
FOUND

9. Is Software Author(s) Jeanne M. Authority He is a writer that is Being a victim in


Piracy actually dedicated in helping and Software Piracy
rising every Title of Journal of rescuing people from is the most
year? magazine Business Piracy. frustrating thing
ethics Currency Not accurate according to that no one is
Date November
published 1994 updating because it has a craving for it.
little period between the
Publisher Springer Link days it was updated in
Accuracy This information provides
City Mexico facts about how the
Software Piracy affect can
or insults a person’s life.
Objectivity Has not that much of bias it
just states the
consequences that people
face when their Software’s
are stolen
Coverage More than world -wide

10. What are Author(s) Vaddadi Authority She is a technology lifestyle Software Piracy
P.Chandu
possible writer. She covers new tech, occurs when
consequences Title of Prevention of internet issues and their someone gains
of Identity magazine Software your information
impact on everyday life.
Theft? Currency It is updated but not regular in your system.
Date September and it provides information
published 2008
that is not accurate.
Accuracy This website provides facts
Publisher Springer about the Software Piracy
Science
and reveals things about
City Mexico crime
Objectivity This has bias because it
often favours’ the side of the
victims
Coverage This website or the
information I get from this
website provides information
of which that is suitable for
my investigation that I am
doing under this topic.
Evaluating Sources

Learner declaration of authenticity

ID Number
Learner Lindokuhle July
name:
Grade 11 Year 2017

Subject

Practical Assessment Task (PAT) Phase 1 Teacher: Ms MV Zweni

Did you receive any help/information from anyone to complete this project?

Yes I went to my community to do some research about potholes and how they feel when they been affected
about it.

No ☒Yes (provide details below)

Help/Information received from


Nature of the help/information (provide evidence):
(person):

I did a lot of research about potholes In my community I made some questionnaire about potholes and
and people are complaining about this how they feel about potholes when they are travelling so they said it
issue because it affects them especially affect them a lot cause their cars they get damaged by potholes.
when they travel long distances.
SIGNITURE OF LEARNER: DATE:
L.July 20/09/2017

Você também pode gostar