You are on page 1of 21

Mzumbe University

Mbeya Campus
LAW 110 - Introduction to Information
Technology and Computer Application Law

Academic Year:2019/2020

1 LAW 110_LLB1_MZUMBE
GROUP ONE

 Discuss and evaluate specific legal, social, ethical and


professional issues in the context of the IT Professional.

LAW 110_LLB1_MZUMBE 2
GROUP TWO

 Clearly explain different types of Software


 Briefly discuss about disaster recovery plan

LAW 110_LLB1_MZUMBE 3
GROUP THREE

 Explain the major components and the characteristics of


computers.
 Discuss ethical issues of the information age

LAW 110_LLB1_MZUMBE 4
GROUP FOUR

 Explain the functions of an operating system. How does


operating system work?

LAW 110_LLB1_MZUMBE 5
GROUP FIVE

 Briefly with examples explain the functions of the


memory
 Narrate about Institutional policies on access to
information sources

LAW 110_LLB1_MZUMBE 6
GROUP SIX

 Will faster and cheaper computers eliminate information


Technology problems? What problems will disappear and
what new problems will arise?

LAW 110_LLB1_MZUMBE 7
GROUP SEVEN

 Explain the use of FTP Protocol in File Transferring


 Explain the impact of Information Technology On Society
 How can you provide security to a PC from attacks?

LAW 110_LLB1_MZUMBE 8
GROUP Eight

 Explain OSI reference model with suitable diagram

LAW 110_LLB1_MZUMBE 9
GROUP NINE
 Briefly narrate the following with examples;
 Law of Copyrights
 Law of patents
 Patent Law
 trade secrets Law
 trademark law

LAW 110_LLB1_MZUMBE 10
GROUP TEN

 Briefly narrate the following with examples;


 intellectual property rights?
 Explain security attacks?
 Enumerate the mechanisms implemented for
confidentiality
 Differentiate symmetric and asymmetric encryption
 Differentiate encryption and decryption?

LAW 110_LLB1_MZUMBE 11
GROUP ELEVEN
 Explain different kinds of threats to information
security
 What are the information security goals? Why different
goals is needed

LAW 110_LLB1_MZUMBE 12
GROUP TWELVE

 Explain denial of Service attacks


 Explain different kinds of firewalls used for network
security
 What is the term risk analysis?
 How is physical security provided for protection needed
outside the computer system?

LAW 110_LLB1_MZUMBE 13
GROUP THIRTEEN

 What are the different types of Malicious code?


 Explain Advanced Encryption Standard algorithm in detail

LAW 110_LLB1_MZUMBE 14
GROUP FOURTEEN

 What are the advantages that modern ICT can bring to


the Society?
 Why should organization assess the objectives of the
business before acquiring new information and
communications technology?

LAW 110_LLB1_MZUMBE 15
GROUP FIFTEEN
 Explain the different types of computer crime and the
difficulties of discovery and prosecution

LAW 110_LLB1_MZUMBE 16
GROUP SIXTEEN
 Describe the aspects of securing corporate data,
including software and data security, disaster recovery
plans, and security legislation.

LAW 110_LLB1_MZUMBE 17
GROUP SEVENTEEN
 What are the main security expectations of customers
and suppliers when conducting e-business with any
business organization?

LAW 110_LLB1_MZUMBE 18
GROUP EIGHTEEN
 Describe in general terms how viruses work, the damage
they can cause, and procedures used to prevent this
damage.

LAW 110_LLB1_MZUMBE 19
GROUP NINETEEN
 Describe in general terms how viruses work, the damage
they can cause, and procedures used to prevent this
damage.

LAW 110_LLB1_MZUMBE 20
GROUP TWENTY
 Explain the threats to personal privacy posed by
computers and the Internet.
 Describe actions you can take to maximize your privacy

LAW 110_LLB1_MZUMBE 21

You might also like