Module Workbook

Module 19: Computer Studies

Security and information systems.

Use this workbook to practice core KCSE communication skills and record evidence of progress.

Module navigation

Move module to module

Use the navigation buttons to move through the workbook in sequence.

SECTION: COMPUTER STUDIES

MODULE: 19

Part A: Units

1. Computer security

a. Threats to computer systems

b. Security measures

c. Data protection

2. Information systems

a. Meaning of information systems

b. Components of information systems

c. Uses of information systems

Part B: Project

Assess security risks and explain how information systems work.

Project Title: Security and Information Systems

Objective: Identify threats and propose protection measures.

Project Instructions:

  1. 1. List three threats to computer systems and their effects.
  2. 2. Propose security measures for each threat.
  3. 3. Describe components of an information system.
  4. 4. Explain one real-world use of an information system.
  5. 5. Consult your coach where necessary.

Evidence to Submit:

  • • Threat list and security measures.
  • • Information system components summary.
  • • Use case description.

Submission

Accepted: PDF, JPG, PNG, DOC, DOCX (max 8MB).

Part C: Training Others

Teach a peer about security and information systems.

Guidance:

  • • Explain common security threats.
  • • Discuss data protection practices.
  • • Describe components of an information system.

Reflection:

  • • What did the learner understand well?
  • • What needed more explanation?
  • • What support do you need from your coach?

Submission

Accepted: PDF, JPG, PNG, DOC, DOCX (max 8MB).

Part D: Assessment

Competency Levels:

1 = Expectations not met

2 = Partially met

3 = Satisfactorily met

4 = Excellently met

Coach assessment: Learner completes the self-assessment using the 1-4 scale. The coach prepares a short quiz or conversation (outside the system if needed) and assigns the coach score.

Self-assessment:

  • • Security threats and measures:
  • • Data protection practices:
  • • Information systems components:

Coach assessment:

  • • Security threats and measures:
  • • Data protection practices:
  • • Information systems components:

Submission

Accepted: PDF, JPG, PNG, DOC, DOCX (max 8MB).

Ready for the next module?

Keep your learning rhythm steady and record your reflections as you progress.