SlideShare a Scribd company logo
1 of 1
ACF.CW.LA1.S01.1




                                       LEMBAGA PEPERIKSAAN MALAYSIA
                                      KEMENTERIAN PELAJARAN MALAYSIA

                                        ASSESSMENT CHECKLIST FORM

LEARNING AREA:                   INFORMATION AND COMMUNICATION TECHNOLOGY AND
                                 SOCIETY

Name of Candidate
IC No
Index No


Construct                  :     S01         Computer Security Measures
Aspect                     :     LA1.S01.1   Apply Correct Security Procedures Using Antivirus
Instrument                 :                 Demonstration
Assessment                 :     1/2/3/_

                                                     Evidence         Assessor tick
                                                                                                Remarks by
No.                     Criterion                 (to be filled by       () if
                                                                                                 assessor
                                              candidate if necessary)  completed
1.       Choose antivirus software to
         be used.
         Write the name of the antivirus
         software.
2.       Start the antivirus software and
         select area to be scanned.
         State the area selected.
3.       Scan the selected area.
         Copy scan summary.
4.       Choose and apply any or all of
         the following when virus is
         detected – delete/remove,
         clean/heal, quarantine/move to
         vault.
         State action taken.
                                                             SCORE
     Candidate’s Signature                                                      Assessor’s Signature



     ------------------------------                                        ----------------------------------
                                                                       Name :
                                                                       Date :

More Related Content

Similar to Acf.cw.la1.s01.1

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
cikguchaen
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
swiss1234
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
swiss1234
 
Web Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxWeb Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docx
jessiehampson
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
Sara Colnago
 

Similar to Acf.cw.la1.s01.1 (20)

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
 
Acf.cw.la3.s06.2
Acf.cw.la3.s06.2Acf.cw.la3.s06.2
Acf.cw.la3.s06.2
 
Acf.cw.la6.s13.1
Acf.cw.la6.s13.1Acf.cw.la6.s13.1
Acf.cw.la6.s13.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la3.s07.1
Acf.cw.la3.s07.1Acf.cw.la3.s07.1
Acf.cw.la3.s07.1
 
Acf cw la5 s11 1
Acf cw la5 s11 1Acf cw la5 s11 1
Acf cw la5 s11 1
 
Acf cw la2 s03 1
Acf cw la2 s03 1Acf cw la2 s03 1
Acf cw la2 s03 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf.cw.la6.s12.1
Acf.cw.la6.s12.1Acf.cw.la6.s12.1
Acf.cw.la6.s12.1
 
Toc.cw.la1.s01.2
Toc.cw.la1.s01.2Toc.cw.la1.s01.2
Toc.cw.la1.s01.2
 
Acf cw la5 s10 1
Acf cw la5 s10 1Acf cw la5 s10 1
Acf cw la5 s10 1
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
 
APMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list DevelopmentAPMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list Development
 
Web Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxWeb Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docx
 
Toc.cw.la1.s01.1
Toc.cw.la1.s01.1Toc.cw.la1.s01.1
Toc.cw.la1.s01.1
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Swascan
Swascan Swascan
Swascan
 

More from smkengkilili2011

More from smkengkilili2011 (17)

Chapter 5( programming) answer
Chapter 5( programming) answerChapter 5( programming) answer
Chapter 5( programming) answer
 
Chapter 6 (information system) answer
Chapter 6 (information system) answerChapter 6 (information system) answer
Chapter 6 (information system) answer
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Acf cw la4 s09 1
Acf cw la4 s09 1Acf cw la4 s09 1
Acf cw la4 s09 1
 
Acf cw la4 s08 1
Acf cw la4 s08 1Acf cw la4 s08 1
Acf cw la4 s08 1
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La4a multimedia notacd10
La4a multimedia  notacd10La4a multimedia  notacd10
La4a multimedia notacd10
 
La4b multimedia notacd09
La4b multimedia notacd09La4b multimedia notacd09
La4b multimedia notacd09
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La5 programming
La5  programmingLa5  programming
La5 programming
 
La3 compnet notes
La3 compnet notesLa3 compnet notes
La3 compnet notes
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La1 ict & society
La1 ict & societyLa1 ict & society
La1 ict & society
 
L6-information-systems
L6-information-systemsL6-information-systems
L6-information-systems
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Acf.cw.la1.s01.1

  • 1. ACF.CW.LA1.S01.1 LEMBAGA PEPERIKSAAN MALAYSIA KEMENTERIAN PELAJARAN MALAYSIA ASSESSMENT CHECKLIST FORM LEARNING AREA: INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY Name of Candidate IC No Index No Construct : S01 Computer Security Measures Aspect : LA1.S01.1 Apply Correct Security Procedures Using Antivirus Instrument : Demonstration Assessment : 1/2/3/_ Evidence Assessor tick Remarks by No. Criterion (to be filled by () if assessor candidate if necessary) completed 1. Choose antivirus software to be used. Write the name of the antivirus software. 2. Start the antivirus software and select area to be scanned. State the area selected. 3. Scan the selected area. Copy scan summary. 4. Choose and apply any or all of the following when virus is detected – delete/remove, clean/heal, quarantine/move to vault. State action taken. SCORE Candidate’s Signature Assessor’s Signature ------------------------------ ---------------------------------- Name : Date :