-
The Computer Society of South Africa (CSSA) is a professional association, established to represent and promote the information and communications technology (ICT) professional and ICT professionalism, as well as to elevate ICT capability in South Africa, and specifically:
* To facilitate the exchange of opinions and views on information and communications technology, and to inform and promote knowledge of ICT to members and the public for the development and use of ICT.
* By representing industry practitioners, to inform and lobby government on ICT policy.
* To obtain from members and other sources information relating to ICT, and to disseminate such information among the public and the Society by means of journals, circulars, publications, lectures, seminars, conferences or otherwise.* To improve the technical and general knowledge and to elevate the professional status of persons engaged in ICT.
* Education and training to elevate the level of ICT capability in southern Africa.
* Professional development and advancement.* Community development that enhances the standards and levels of ICT for the greater good of the South African people.
* To do all such other lawful things as are incidental or conducive to the attainment of the above purposes.
Computer Society South Africa has members in all of the provinces in South Africa, and the CSSA has regional representation through chapters in the Western Cape, KwaZulu-Natal and Gauteng.
Author: Neftaly Malatjie
114055 LG 1.4 The Computer Society of South Africa
114055 LG 1.3 PROFESSIONAL BODIES IN SOUTH AFRICA. A SHORT DESCRIPTION OF EACH NAMED PROFESSIONAL BODY IS PROVIDED
-
Professionalism
Students should be encouraged to become involved professionally while they are in school and to continue their professional involvement throughout their career. Several societies and professional organizations are concerned with security
-
114046 SA 1.2 Question 2
Question 2 (SO 3, AC 1, AC 2)
- Research and report on various sources of support available to LAN computer networks. (8 marks)
- What are the general expectations of user’s for different support options. (6 marks)
114055 LG 1.25 Sabotage
-
-
The computer can be the object of attack in computer crimes such as the unauthorized use of computer facilities, alternation or destruction of information, data file sabotage and vandalism against a computer system. Computers have been shot, stabbed, short-circuited and bombed.
-
-
114055 LG 1.24 Trade Secrets
-
-
A trade secret protects something of value and usefulness. This law protects the unique and secret aspects of ideas, known only to the discoverer or his confidants. Once disclosed the trade secret is lost as such and can only be protected under one of the following laws. The application of trade secret law is very important in the computer field, where even a slight head start in the development of software or hardware can provide a significant competitive advantage.
-
-