upss1 f4 ict 2016
Post on 06-Jul-2018
217 Views
Preview:
TRANSCRIPT
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 1/12
CONFIDENTIAL 3765/1
ANSWER SHEET SECTION A
Question No Candidate’s Answer Marks
1 i. A = 1
ii. B = 2
2 3
3 i 4ii 5
4 i. 6
ii. 7
5 i. 8
ii. 9
6 10
7 i. 11
ii. 12
8 i. 13
ii. 14
9 i. 15ii. 16
10 i. 17
ii. 18
11 i. 19
ii. 20
12 21
13 22
14 23
15 ii 24
iii 25
16 2617 i. 27
ii. 28
18 29
19
i 30
ii 31
20 i. 32
ii. 33
21 i. 34
ii. 35
22 36
23 3724 i. 38
ii. 39
1
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 2/12
CONFIDENTIAL 3765/1
iii. 40
SECTION A [4 MAR!S"
Answer a## questions. Write your answers in the spaces provided in Answer S$eet. ach
answer carries one !ar".
1. #i$ure 1 show two techno%o$ies used in the $enerations o& co!puters.
'ased on #i$ure 1( state the $eneration o& co!puter usin$ techno%o$y
)i* A
)ii* '
2. +tate the na!e o& the &irst $eneration co!puter. ,,,,,,,,,,,,,,,,,,
3. -o!p%ete the &o%%owin$ state!ent
/n&or!ation and -o!!unication echno%o$y is the use o& co!puters( ,,,,,)i*,,,,,
devices and ,,,,,,,)ii*,,,,,,,app%ications &or processin$( storin$( retrievin$(
protectin$ and trans!ittin$ in&or!ation &ro! anywhere at any ti!e.
4. 'ased on &i$ures e%ow( state the co!puter $eneration %eve%
2
NAME : _____________________________
CLASS : _____________________________
IC NO : _____________________________
X
Y
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 3/12
CONFIDENTIAL 3765/1
i. ............................. ii. .............................................
5. a%e 1 shows the usa$e o& /- in dai%y %i&e.
a%e 1
atch A( ' or - with the &o%%owin$ state!ents.
)i* -o!puters are used to &aci%itate production p%annin$ and contro% syste!s.
)ii* -o!puters are used to enhance %earnin$ and $ive interactive eperiences.
6. #i$ure 1 shows the usa$e o& /n&or!ation -o!!unication and echno%o$y in two
di&&erent &ie%ds.
Activity o& echan$in$( uyin$ and se%%in$ o& co!!odities in %ar$e sca%e
invo%vin$ transportation &ro! p%ace to another. ransaction is done without
!eetin$ a person.
rovide on%ine services such a &und trans&er and i%% pay!ent. ransaction
can e done at any ti!e and any p%ace.
'an"in$
#i$ure 1
'ased on state!ent in #i$ure 1( state the na!e o& &ie%d
7. a%e 1 shows the characteristics o& and in co!puter usa$e $uide%ine.
ora% $uide%ines &or co!puter users. u%es &or co!puter users.
o pena%ty or punish!ent. ena%ties or punish!ents i!posed.
.
a%e 1
'ased on a%e 1( state
)i*
)ii*
8. +tate!ent e%ow is aout co!puter ethics. +tate whether the &o%%owin$ state!ents isTrue or %a#se.)i* -o!puter users !ust &o%%ow the co!puter ethics to avoid %e$a% action.
)ii* A syste! o& !ora% standards or va%ues used as a $uide%ine &or co!puter users is"nown as cyer %aws.
3
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 4/12
CONFIDENTIAL 3765/1
9. a%e 1 shows the characteristics o& the operation !ode in -o!pany A and -o!pany '.Co&'an( A Co&'an( B
- sin$ i%%oard to advertise new
product
- eceive custo!er order y
te%ephone
- A%% transactions recorded in &or!s
- ro!ote new product at
co!pany:s wesite
- eceive custo!er order y e!ai%
- A%% transactions recorded in
e%ectronic &or!s
a%e 1
'ased on a%e 1( state the operation !ode use in
i. -o!pany A
ii. -o!pany '
10. a%e 2 shows ter!s which are re%ated to co!puter ethics and %e$a% issues
A rivacy
' /nte%%ectua% property
- -yer ;aw
< -o!puter ethics
a%e 2
'ased on a%e 2( write A( '( - or < to !atch the &o%%owin$ state!ents
)i* +tandards !ora% conduct in the use o& co!puters
)ii* he ri$ht o& and individua% to restrict the co%%ection and use o& persona% data
11. #i$ure 1 shows in&or!ation on two types o& authentication !ethods.
'ased on &i$ure 1( state the na!e o&
i.
ii. =
12. Words( na!es( sy!o%s( device and i!a$es that represent products( $oods or services
can e protected under the ,,,,,,,,,,,,,,,,.
A atent ' <esi$n
- -opyri$ht < rade!ar"
13. >>>>>>>>..is the act o& provin$ or disprovin$ the correctness o& a syste! with
4
Authentication !ethod
=
ai services oo"in$urchase usin$ credit card ? etina% scannin$? voice reco$nition
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 5/12
CONFIDENTIAL 3765/1
respect to a certain &or!a% speci&ication.
A. Authentication -. @eri&ication
'. 'io!etric <evices <. +ite '%oc"in$
14. #i$ure 1 shows one type o& io!etric device.
'ased on #i$ure %(
)i* +tate the na!e o& the device.
15. #i$ure 3)a* and #i$ure 3)* show io!etric authentication !ethods.
#i$ure 3)a* #i$ure 3)*
'ased on #i$ure 3)a*( and #i$ure 3 )* states the !ethods used.
)i* #i$ure 3)a*
)ii* #i$ure 3 )*
16. +tate whether the &o%%owin$ state!ent is rue or #a%se.
'ased on the tet( the %o$$er has co!!itted a cri!e re%ated to porno$raphy.>>>>>>>>>>>>>>.
17. We need co!puter ethics and %aws to $uide users &ro! !isusin$ the co!puter. +tate
whether the &o%%owin$ state!ents is True or %a#se.
i. sin$ !ateria%s &ro! wesites as a resource &or assi$n!ent without $ivin$ credit
to the ori$ina% author is considered unethica%.ii. +e%%in$ pirated so&tware to a &riend is an ea!p%e o& %aw rea"in$.
5
A %o$$er in ua%a ;u!pur was &ined 10( 000 y the court ecause he has
posted a &a%se state!ent re$ardin$ po%itician receivin$ ries in his %o$.
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 6/12
CONFIDENTIAL 3765/1
18. #i$ure 2 shows part o& an a%$orith! &or a we pa$e &i%ter.
#i$ure 2
+tate the &i%terin$ !ethod used in the a%$orith! >>>>>>>>>>..
19. #i$ure 1 shows the "eyword %oc"in$ process
#i$ure 1
6
START
Use !""ess !
#e$ %!&e
C'()!*(e+
$!((e+ #'+s,
STO-
A
C
ES NO
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 7/12
CONFIDENTIAL 3765/1
'ased on &i$ure 1 write A( ' or - to !atch the &o%%owin$ state!ent
i. a$e down%oad stops
ii. +earch &or anned words
20. atch each o& the ter!s e%ow to the correct state!ent.
)orno*ra'$( S#ander
)i* -an %ead to cri!ina% acts such as ep%oitation o& wo!en and chi%dren.)ii* -an %ead to unnecessary ar$u!ent
21. a%e 1 shows the ter!s used in co!puter security
A eyword %oc"in$
' +ite %oc"in$
- We atin$ syste!< Bac"ers
he&t
a%e 1
'ased on a%e 1( write A( '( -( < or &or the &o%%owin$ state!ent.
)i* %nternet &i%terin$ !ethod that is used to prevent prohiited wesite &ro! ein$
accessed or opened y consu!er>>>..
)ii* ichea% runs o&& on coursewor" that is down%oaded &ro! internet and c%ai!ed
that it is his wor">>>
22. +tate whether the &o%%owin$ state!ent is True or %a#se.
-oo"ies ena%e we sites to co%%ect in&or!ation aout your on%ine activities and store
the! &or &uture use. hen( the co%%ected detai%s wi%% e so%d to any co!pany that
requests &or it.
23. 'e%ow are the ea!p%es on how the co!puter techno%o$y threatens the privacy o& our
data.
/ +pyware // -oo"ies
/// hishin$ /@ #irewa%%
A. /( // and ///
'. /( // and /@
-. /( /// and /@
<. //( /// and /@
24. atch each state!ent e%ow with the correct ter! y writin$ A( ' or -.
A rs. +hei%a received an e!ai% statin$ her an" dec%aration in&or!ation !ust e
updated ecause there is an attac" on the an" account. o update( she !ust &o%%ow
the instructions &ro! the e!ai% received.
' Basnu% &ind an on%ine an" account o& his &riends( a!%an have not een c%osed.
Basnu% too" the opportunity to trans&er 100 to hir an" account. Basnu% ta"e on%y
100 ecause a!%an owe hi! that !uch.- aria! uses so&tware that auto!atica%%y down%oads the son$ &ro! the internet. he
7
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 8/12
CONFIDENTIAL 3765/1
son$s down%oaded are saved and she so!eti!es so%d to his &riends as rin$tones.
-o!puter the&t >>>>..
-opyri$ht in&rin$e!ent >>>>..
-o!puter &raud >>>>..
SECTION B [+ MAR!S"his section consists o& ,i-e questions. ou are required to answer a## questions.
Question +.
+tate a di&&erence etween the education e&ore /- and education with /-.
a.
C2 !ar"sD
. ;ist WE sectors that use /- in dai%y %i&e.
C2 !ar"sD
Question +/
he +tate!ent in a%e 1 is aout co!puter conducts.
udy is a -o!puter +cience student in a university. Be secret%y uses his &riendFs e?!ai%
/< to send a threatenin$ e?!ai% to one o& his course !ate.
'ased on the state!ent(
)a* +tate the conduct that is considered as
)i* nethica%
8
ducation with /-ducation e&ore /-
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 9/12
CONFIDENTIAL 3765/1
)ii* ;aw rea"in$
C2 !ar"sD
)* +tate two di&&erences etween the conducts in )a*.
Et$i0s 1aw
C2 !ar"sD
Question +2
+tate!ent 2 shows how edai !as -orporation hand%es its security procedure
+tate!ent 2'ased on +tate!ent 2(a. )i* +tate the !ethod o& authentication used y edai !as 999.
C1 !ar"D
)iii* Give WE other ea!p%es that can e used y edai !as 999 as a securitycontro% device.
C2!ar"sD
. +tate another !ethod o& authentication that can e app%ied in edai !as 999.
9
edai !as 999 is the ranches o& $o%d shop own y !as -orporation. he !ana$er o& edai !as 999 has &ied &in$er print scanner device at $o%d stoc" roo! as a stepso& security contro%.
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 10/12
CONFIDENTIAL 3765/1
C1!ar"D
Question +3
#i$ure 3 )a* shows a student sur&in$ the /nternet in the schoo%. #i$ure 3 )* shows part o& the
we rowser screen disp%ay when he tries to access the ; in #i$ure 3 )a*.
10
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 11/12
CONFIDENTIAL 3765/1
#i$ure 3
'ased on #i$ure 3(
)a* p%ain the type o& &i%terin$ used
C2 !ar"sD
)* +tate two ne$ative e&&ects on the student i& he is a%e to access the we site
C2 !ar"sD
Question +
Answer the &o%%owin$ questions ased on the situation e%ow.
a* Who has co!!itted in co!puter cri!eH +tate the type o& co!puter cri!e he:she has
co!!itted.
C2 !ar"sD
* Iusti&y you answer.
11
Iu%ia has purchased co!!ercia% app%ication so&tware and she up%oads the so&tware to
her we &or others to down%oad it
Iohan has down%oaded open source app%ication so&tware &ro! the internet. Be then
dup%icates the so&tware and distriutes to his &riends.
8/18/2019 Upss1 f4 Ict 2016
http://slidepdf.com/reader/full/upss1-f4-ict-2016 12/12
CONFIDENTIAL 3765/1
C1 !ar"D
c* ;ist another type o& co!puter cri!e C1 !ar"sD
EN5 O% Q6ESTIONS
12
top related