Describe what hacking of memory or hacking of RAM means.
1. Describe what hacking of memory or hacking of RAM means. Weight: 20%
Did not submit or incompletely described what hacking of memory or hacking of RAM means.
Insufficiently described what hacking of memory or hacking of RAM means.
Partially described what hacking of memory or hacking of RAM means.
Satisfactorily described what hacking of memory or hacking of RAM means.
Thoroughly described what hacking of memory or hacking of RAM means.
2. Examine the common tools that hackers use to
Did not submit or incompletely examined the
Insufficiently examined the common tools
Partially examined the common tools
Satisfactorily examined the common tools
Thoroughly examined the common tools
hack into memory of computing devices. Detail two
(2) real-life
examples of such tools in action.
Weight: 25%
common tools that hackers use
to hack into memory of computing devices. Did not submit or incompletely detailed two (2)
real-life
examples of such tools in action.
that hackers use
to hack into memory of computing devices.
Insufficiently detailed two (2)
real-life
examples of such tools in action.
that hackers use
to hack into memory of computing devices. Partially detailed two (2)
real-life
examples of such tools in action.
that hackers use
to hack into memory of computing devices. Satisfactorily detailed two (2)
real-life
examples of such tools in action.
that hackers use
to hack into memory of computing devices. Thoroughly detailed two (2) real-life examples of such tools in action.
3. Identify three (3) best practices that one should use to
protect their computer(s) from being hacked. Weight: 20%
Did not submit or incompletely identified three (3) best practices that one should use to protect their computer(s) from being hacked.
Insufficiently identified three
(3) best practices that one should use
to protect their computer(s) from being hacked.
Partially identified three
(3) best practices that one should use
to protect their computer(s) from being hacked.
Satisfactorily identified three (3) best practices that one should use to protect their computer(s) from being hacked.
Thoroughly identified three (3) best practices that one should use to protect their computer(s) from being hacked.
4. Analyze the significance of hacking in organizations and modern society. Weight: 20%
