Module Workbook

Module 14: Computer Studies

Computer security and information systems.

Use this workbook to practice core KCSE communication skills and record evidence of progress.

Module navigation

Move module to module

Use the navigation buttons to move through the workbook in sequence.

SECTION: COMPUTER STUDIES

MODULE: 14

Part A: Units

1. Computer security

a. Threats to computer systems

b. Security measures

c. Data protection

2. Information systems

a. Meaning of information systems

b. Components of information systems

c. Uses of information systems

Part B: Project

Review security threats and map information system components.

Project Title: Security and Information Systems Review

Objective: Identify security risks and explain information system components.

Project Instructions:

  1. 1. List five threats to computer systems.
  2. 2. Match each threat to a security measure.
  3. 3. Describe data protection practices (passwords, backups).
  4. 4. Explain components of an information system with examples.
  5. 5. Describe two uses of information systems in daily life.
  6. 6. Consult your coach where necessary.

Evidence to Submit:

  • • Threats and security measures list.
  • • Data protection summary.
  • • Information systems components and uses.

Submission

Accepted: PDF, JPG, PNG, DOC, DOCX (max 8MB).

Part C: Training Others

Guide a peer on security and information systems.

Guidance:

  • • Explain common security threats and protections.
  • • Discuss data protection practices.
  • • Describe information system components and uses.

Reflection:

  • • What did the learner understand well?
  • • What needed more explanation?
  • • What support do you need from your coach?

Submission

Accepted: PDF, JPG, PNG, DOC, DOCX (max 8MB).

Part D: Assessment

Competency Levels:

1 = Expectations not met

2 = Partially met

3 = Satisfactorily met

4 = Excellently met

Coach assessment: Learner completes the self-assessment using the 1-4 scale. The coach prepares a short quiz or conversation (outside the system if needed) and assigns the coach score.

Self-assessment:

  • • Security threats and measures:
  • • Data protection:
  • • Information systems:

Coach assessment:

  • • Security threats and measures:
  • • Data protection:
  • • Information systems:

Submission

Accepted: PDF, JPG, PNG, DOC, DOCX (max 8MB).

Ready for the next module?

Keep your learning rhythm steady and record your reflections as you progress.