Escolar Documentos
Profissional Documentos
Cultura Documentos
Cyber crime
Cat Application Technology
By :Lindokuhle July
9/15/2017
[Type the abstract of the document here. The abstract is typically a short summary of the contents of the
document. Type the abstract of the document here. The abstract is typically a short summary of the contents of
the document.]
Table of Contents
Introduction……………………………………………………………………………………………………………………….1
Task definition…………………………………………………………………………………………………………………..2
Content.................................................................................................................................3
Findings……………………………………………………………………………………………………………………………4
Conclusion……………………………………………………………………………………………………………………….5
Bibliography…………………………………………………………………………………………………………………….6
Appendices……………………………………………………………………………………………………………………...7
Introduction
Task Definition
I’m doing this investigation because most of tools that are required to bring down the rate by 10
percentage points are in a place. It’s just a matter of robust implementation. Take a country like China,
where four out of five of the programs being used there are not paid for. Many countries have copyright
laws on the books. They have an administrative process for enforcing them. Anyone can bring copyright
infringement cases in the courts there, but there’s just not enough resources applied to make all that
work’’.
My will be about costs for using pirated software that isn’t supported and the productivity, or capital
costs, that come from a greater prevalence of viruses or security breaches. And there are legal costs
associated with operating in violation of the law. So it’s not as simple as ‘I have free software.’ ’’
How will you go about conducting the investigation, considering the PAT requirements?
The way I will go about conducting my investigation, considering my PAT requirements, I must have
reasons and justification for using software in violation of its end user licensing agreement (EULA).My
first reason:(a) One is the fact that it is extremely easy to do because of the nature of digital media (b)
Another is that users find it prohibitively expensive to purchase proprietary software at the prices set by
its vendors.
The information are Secret Allies moreover, there is a widely held suspicion that developers of
commercial software themselves are secretly in favour of some extent of copying and use of their
software in violation of end licensing agreements despite their incessant publicity about the supposed
harm that it causes. One reason for this is that such practices are extremely valuable for familiarizing
people with the software who otherwise would not be able to afford it. So my information is for people.
I will present my PAT by Software Presentation where I will tell my classmates or teacher that some industry
executives assert that unauthorized copying and use is by far the biggest problem facing the software industry.
This explains that the way they supposed losses are computed is faulty and results in a wild exaggeration .
Focus Question
How can my school and my fellow learners be educated and protect themselves against cybercrime?
Content
Findings
Summary of Gender
18
16
14
12
10
8
6
4
2
0
1 2
This is a graph that shows how many males and females I do my questionnaire on them. I have
asked 17 females, which means I have asked 30 in my questionnaire.
30
20
10
0
Querstion 1 Question 2 Question 3 Question 4 Question 5
This graph above shows all the people that have been answer all my questions, Blue are the
people who said “Yes” in my questions, which means the “yes” on my questions are 59.The
green line is “Maybe” this means they are 9.The red is “No” , which means there are 69 no’s on
my questions.
Conclusion
Bibliography
Appendices
Folder Structure
NO QUESTION QUESTION POSSIBLE CATEGORY BIBLIOGRAPHY INFORMATION QUALITY OF INFORMATION FOUND SUMMARY OF
S LEVEL SOURCES INFORMATION FOUND
1. When 1 Yahoo! Author(s) Paul Craig Authority Software Piracy Information found on the
software Exposed internet
piracy could
end in Name of website Science direct.com Currency 2005
Africa?
Date created 2005 Accuracy it is realistic
2. What would 4 Google Author(s) Zander Angelini Authority Digital and Software Information found on
be the best Google
prevention Name of website Currency May 2015
of software
piracy? Date created May 2015 Accuracy it is realistic
3. Why people 2 Wikipedia Author(s) Adrian John Authority Piracy: The Intellectual Information found in the
do software Property Wars magazine
piracy?
Name of website Books.google.com Currency Jan 2010
City Brazil
NO QUESTION QUESTION LEVEL POSSIBLE CATEGORY BIBLIOGRAPHY INFORMATION QUALITY OF INFORMATION FOUND SUMMARY OF
S SOURCES INFORMATION FOUND
5. What if all 3 Yahoo! Author(s) Paul Craig Authority Piracy Exposed Information found on the
the piracies internet
don’t pull out Name of website Books.google.com Currency 2005
in software
piracy? Date created 2005 Accuracy it seems realistic
7. Does the 2 Wikipedia Author(s) Krzysztof Wilczynski Authority Information found in the
world have a magazine
solution for Name of website http://www.piratesinfo. Currency
this com/cpi_Software_Pir
problem? acy_549.asp
City America
NO. QUESTIONS QUESTION POSSIBLE CATEGORY BIBLIOGRAPHY INFORMATION QUALITY INFORMATION FOUND SUMMARY OF
LEVEL SOURCES INFORMATION
FOUND
10. What are Author(s) Vaddadi Authority She is a technology lifestyle Software Piracy
P.Chandu
possible writer. She covers new tech, occurs when
consequences Title of Prevention of internet issues and their someone gains
of Identity magazine Software your information
impact on everyday life.
Theft? Currency It is updated but not regular in your system.
Date September and it provides information
published 2008
that is not accurate.
Accuracy This website provides facts
Publisher Springer about the Software Piracy
Science
and reveals things about
City Mexico crime
Objectivity This has bias because it
often favours’ the side of the
victims
Coverage This website or the
information I get from this
website provides information
of which that is suitable for
my investigation that I am
doing under this topic.
Evaluating Sources
ID Number
Learner Lindokuhle July
name:
Grade 11 Year 2017
Subject
Did you receive any help/information from anyone to complete this project?
Yes I went to my community to do some research about potholes and how they feel when they been affected
about it.
I did a lot of research about potholes In my community I made some questionnaire about potholes and
and people are complaining about this how they feel about potholes when they are travelling so they said it
issue because it affects them especially affect them a lot cause their cars they get damaged by potholes.
when they travel long distances.
SIGNITURE OF LEARNER: DATE:
L.July 20/09/2017