SlideShare a Scribd company logo
1 of 1
ACF.CW.LA1.S01.1




                                       LEMBAGA PEPERIKSAAN MALAYSIA
                                      KEMENTERIAN PELAJARAN MALAYSIA

                                        ASSESSMENT CHECKLIST FORM

LEARNING AREA:                   INFORMATION AND COMMUNICATION TECHNOLOGY AND
                                 SOCIETY

Name of Candidate
IC No
Index No


Construct                  :     S01         Computer Security Measures
Aspect                     :     LA1.S01.1   Apply Correct Security Procedures Using Antivirus
Instrument                 :                 Demonstration
Assessment                 :     1/2/3/_

                                                     Evidence         Assessor tick
                                                                                                Remarks by
No.                     Criterion                 (to be filled by       () if
                                                                                                 assessor
                                              candidate if necessary)  completed
1.       Choose antivirus software to
         be used.
         Write the name of the antivirus
         software.
2.       Start the antivirus software and
         select area to be scanned.
         State the area selected.
3.       Scan the selected area.
         Copy scan summary.
4.       Choose and apply any or all of
         the following when virus is
         detected – delete/remove,
         clean/heal, quarantine/move to
         vault.
         State action taken.
                                                             SCORE
     Candidate’s Signature                                                      Assessor’s Signature



     ------------------------------                                        ----------------------------------
                                                                       Name :
                                                                       Date :

More Related Content

Similar to Acf.cw.la1.s01.1

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4cikguchaen
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008swiss1234
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008swiss1234
 
APMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list DevelopmentAPMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list DevelopmentBid to Win Ltd
 
Web Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxWeb Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxjessiehampson
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan OverviewSara Colnago
 

Similar to Acf.cw.la1.s01.1 (20)

Borang assesment ict form 4
Borang assesment ict form 4Borang assesment ict form 4
Borang assesment ict form 4
 
Acf.cw.la3.s06.2
Acf.cw.la3.s06.2Acf.cw.la3.s06.2
Acf.cw.la3.s06.2
 
Acf.cw.la6.s13.1
Acf.cw.la6.s13.1Acf.cw.la6.s13.1
Acf.cw.la6.s13.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la1.s02.1
Acf.cw.la1.s02.1Acf.cw.la1.s02.1
Acf.cw.la1.s02.1
 
Acf.cw.la3.s07.1
Acf.cw.la3.s07.1Acf.cw.la3.s07.1
Acf.cw.la3.s07.1
 
Acf cw la5 s11 1
Acf cw la5 s11 1Acf cw la5 s11 1
Acf cw la5 s11 1
 
Acf cw la2 s03 1
Acf cw la2 s03 1Acf cw la2 s03 1
Acf cw la2 s03 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf cw la2 s05 1
Acf cw la2 s05 1Acf cw la2 s05 1
Acf cw la2 s05 1
 
Acf.cw.la6.s12.1
Acf.cw.la6.s12.1Acf.cw.la6.s12.1
Acf.cw.la6.s12.1
 
Toc.cw.la1.s01.2
Toc.cw.la1.s01.2Toc.cw.la1.s01.2
Toc.cw.la1.s01.2
 
Acf cw la5 s10 1
Acf cw la5 s10 1Acf cw la5 s10 1
Acf cw la5 s10 1
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
 
Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008Routine data quality assessment tool june 2008
Routine data quality assessment tool june 2008
 
APMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list DevelopmentAPMP Foundation: Requirements and Compliance Check-list Development
APMP Foundation: Requirements and Compliance Check-list Development
 
Web Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docxWeb Security Assessment ReportApplication NameVersion 1.0.docx
Web Security Assessment ReportApplication NameVersion 1.0.docx
 
Toc.cw.la1.s01.1
Toc.cw.la1.s01.1Toc.cw.la1.s01.1
Toc.cw.la1.s01.1
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Swascan
Swascan Swascan
Swascan
 

More from smkengkilili2011

More from smkengkilili2011 (17)

Chapter 5( programming) answer
Chapter 5( programming) answerChapter 5( programming) answer
Chapter 5( programming) answer
 
Chapter 6 (information system) answer
Chapter 6 (information system) answerChapter 6 (information system) answer
Chapter 6 (information system) answer
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Acf cw la4 s09 1
Acf cw la4 s09 1Acf cw la4 s09 1
Acf cw la4 s09 1
 
Acf cw la4 s08 1
Acf cw la4 s08 1Acf cw la4 s08 1
Acf cw la4 s08 1
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La4a multimedia notacd10
La4a multimedia  notacd10La4a multimedia  notacd10
La4a multimedia notacd10
 
La4b multimedia notacd09
La4b multimedia notacd09La4b multimedia notacd09
La4b multimedia notacd09
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
La5 programming
La5  programmingLa5  programming
La5 programming
 
La3 compnet notes
La3 compnet notesLa3 compnet notes
La3 compnet notes
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La1 ict & society
La1 ict & societyLa1 ict & society
La1 ict & society
 
L6-information-systems
L6-information-systemsL6-information-systems
L6-information-systems
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Acf.cw.la1.s01.1

  • 1. ACF.CW.LA1.S01.1 LEMBAGA PEPERIKSAAN MALAYSIA KEMENTERIAN PELAJARAN MALAYSIA ASSESSMENT CHECKLIST FORM LEARNING AREA: INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY Name of Candidate IC No Index No Construct : S01 Computer Security Measures Aspect : LA1.S01.1 Apply Correct Security Procedures Using Antivirus Instrument : Demonstration Assessment : 1/2/3/_ Evidence Assessor tick Remarks by No. Criterion (to be filled by () if assessor candidate if necessary) completed 1. Choose antivirus software to be used. Write the name of the antivirus software. 2. Start the antivirus software and select area to be scanned. State the area selected. 3. Scan the selected area. Copy scan summary. 4. Choose and apply any or all of the following when virus is detected – delete/remove, clean/heal, quarantine/move to vault. State action taken. SCORE Candidate’s Signature Assessor’s Signature ------------------------------ ---------------------------------- Name : Date :