SlideShare a Scribd company logo
1 of 1
ACF.CW.LA1.S01.1




                                       LEMBAGA PEPERIKSAAN MALAYSIA
                                      KEMENTERIAN PELAJARAN MALAYSIA

                                        ASSESSMENT CHECKLIST FORM

LEARNING AREA:                   INFORMATION AND COMMUNICATION TECHNOLOGY AND
                                 SOCIETY

Name of Candidate
IC No
Index No


Construct                  :     S01         Computer Security Measures
Aspect                     :     LA1.S01.1   Apply Correct Security Procedures Using Antivirus
Instrument                 :                 Demonstration
Assessment                 :     1/2/3/_

                                                     Evidence         Assessor tick
                                                                                                Remarks by
No.                     Criterion                 (to be filled by       () if
                                                                                                 assessor
                                              candidate if necessary)  completed
1.       Choose antivirus software to
         be used.
         Write the name of the antivirus
         software.
2.       Start the antivirus software and
         select area to be scanned.
         State the area selected.
3.       Scan the selected area.
         Copy scan summary.
4.       Choose and apply any or all of
         the following when virus is
         detected – delete/remove,
         clean/heal, quarantine/move to
         vault.
         State action taken.
                                                             SCORE
     Candidate’s Signature                                                      Assessor’s Signature



     ------------------------------                                        ----------------------------------
                                                                       Name :
                                                                       Date :

More Related Content

Similar to Acf.cw.la1.s01.1

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
cikguchaen
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
swiss1234
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
swiss1234
 
Web Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxWeb Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docx
jessiehampson
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
Sara Colnago
 

Similar to Acf.cw.la1.s01.1 (20)

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
 
Acf.cw.la3.s06.2
Acf.cw.la3.s06.2Acf.cw.la3.s06.2
Acf.cw.la3.s06.2
 
Acf.cw.la6.s13.1
Acf.cw.la6.s13.1Acf.cw.la6.s13.1
Acf.cw.la6.s13.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la3.s07.1
Acf.cw.la3.s07.1Acf.cw.la3.s07.1
Acf.cw.la3.s07.1
 
Acf cw la5 s11 1
Acf cw la5 s11 1Acf cw la5 s11 1
Acf cw la5 s11 1
 
Acf cw la2 s03 1
Acf cw la2 s03 1Acf cw la2 s03 1
Acf cw la2 s03 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf.cw.la6.s12.1
Acf.cw.la6.s12.1Acf.cw.la6.s12.1
Acf.cw.la6.s12.1
 
Toc.cw.la1.s01.2
Toc.cw.la1.s01.2Toc.cw.la1.s01.2
Toc.cw.la1.s01.2
 
Acf cw la5 s10 1
Acf cw la5 s10 1Acf cw la5 s10 1
Acf cw la5 s10 1
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
 
APMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list DevelopmentAPMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list Development
 
Web Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxWeb Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docx
 
Toc.cw.la1.s01.1
Toc.cw.la1.s01.1Toc.cw.la1.s01.1
Toc.cw.la1.s01.1
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Swascan
Swascan Swascan
Swascan
 

More from smkengkilili2011

More from smkengkilili2011 (17)

Chapter 5( programming) answer
Chapter 5( programming) answerChapter 5( programming) answer
Chapter 5( programming) answer
 
Chapter 6 (information system) answer
Chapter 6 (information system) answerChapter 6 (information system) answer
Chapter 6 (information system) answer
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Acf cw la4 s09 1
Acf cw la4 s09 1Acf cw la4 s09 1
Acf cw la4 s09 1
 
Acf cw la4 s08 1
Acf cw la4 s08 1Acf cw la4 s08 1
Acf cw la4 s08 1
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La4a multimedia notacd10
La4a multimedia  notacd10La4a multimedia  notacd10
La4a multimedia notacd10
 
La4b multimedia notacd09
La4b multimedia notacd09La4b multimedia notacd09
La4b multimedia notacd09
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La5 programming
La5  programmingLa5  programming
La5 programming
 
La3 compnet notes
La3 compnet notesLa3 compnet notes
La3 compnet notes
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La1 ict & society
La1 ict & societyLa1 ict & society
La1 ict & society
 
L6-information-systems
L6-information-systemsL6-information-systems
L6-information-systems
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Acf.cw.la1.s01.1

  • 1. ACF.CW.LA1.S01.1 LEMBAGA PEPERIKSAAN MALAYSIA KEMENTERIAN PELAJARAN MALAYSIA ASSESSMENT CHECKLIST FORM LEARNING AREA: INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY Name of Candidate IC No Index No Construct : S01 Computer Security Measures Aspect : LA1.S01.1 Apply Correct Security Procedures Using Antivirus Instrument : Demonstration Assessment : 1/2/3/_ Evidence Assessor tick Remarks by No. Criterion (to be filled by () if assessor candidate if necessary) completed 1. Choose antivirus software to be used. Write the name of the antivirus software. 2. Start the antivirus software and select area to be scanned. State the area selected. 3. Scan the selected area. Copy scan summary. 4. Choose and apply any or all of the following when virus is detected – delete/remove, clean/heal, quarantine/move to vault. State action taken. SCORE Candidate’s Signature Assessor’s Signature ------------------------------ ---------------------------------- Name : Date :