This document provides the marking scheme for an ICT trial exam from 2012. It outlines the questions, answers, and marks allocated for each part of the exam. The exam consisted of multiple choice and written response questions. Section A involved answering questions about ICT concepts and received marks for each correct answer. Section B required explaining ICT terms and concepts in short paragraphs and was marked based on addressing the criteria for each question. Section C involved longer written responses involving topics like cyber law, multimedia testing, system development approaches, and computer security measures. Responses were evaluated on addressing various elements in their explanations, such as providing definitions, examples, and comparing different options.
This is the Continuous Assessment Test For Data Processing for Senior Secondary One also known as SS1 First Term Work, in this test I included Test of Practical so as to prepare them early for their Waec Examiniation
This is the Continuous Assessment Test For Data Processing for Senior Secondary One also known as SS1 First Term Work, in this test I included Test of Practical so as to prepare them early for their Waec Examiniation
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxjoellemurphey
REVIEW FINAL STUDY GUIDE
Question 1
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.
Answer
A.
microcomputer
B.
midrange computer
C.
mainframe
D.
supercomputer
E.
laptop computer
2 points
Question 2
The advantages of server virtualization include all of the following except:
Answer
A.
organization uses more servers to respond to quickly changing demands
B.
increased organizational agility
C.
focus of IT department shifts to services rather than supporting the technology
D.
cost savings
E.
reduced number of employees
2 points
Question 3
The _____ of computers used integrated circuits for storing and processing information.
Answer
A.
fifth generation
B.
second generation
C.
third generation
D.
first generation
E.
fourth generation
2 points
Question 4
_____ applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.
Answer
A.
A server farm
B.
The Internet
C.
Grid computing
D.
Utility computing
E.
Virtualization
2 points
Question 5
The _____ of computers used massively parallel processing to process information.
Answer
A.
fifth generation
B.
third generation
C.
first generation
D.
fourth generation
E.
second generation
2 points
Question 6
The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called:
Answer
A.
read-only memory
B.
cache memory
C.
registers
D.
flash memory
E.
random access memory
2 points
Question 7
The main types of primary storage are:
Answer
A.
register
B.
random access memory
C.
cache memory
D.
read-only memory
E.
all of the above
2 points
Question 8
Increased microprocessor complexity comes from which of the following?
Answer
A.
decreasing line width
B.
increasing transistor miniaturization
C.
using new materials for the chip that increase conductivity
D.
putting more transistors on the chip
E.
all of the above
2 points
Question 9
A(n) _____ offers you the option of shopping online with a disposable credit card number.
Answer
A.
credit card
B.
bank card
C.
driver's license
D.
debit card
E.
virtual credit card
2 points
Question 10
Software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings is best described as a(n) _____.
Answer
A.
anti-malware package
B.
anti-spyware package
C.
proactive monitoring package
D.
content-filtering package
E.
personal firewall
2 points
Question 11
Personal firewalls perform all of the following functions except:
Answer
A.
They should block outbound connections that you do not initiate.
B.
They should seek out the origin of malware in an attempt to block it in the future.
C.
They should make your computer invi ...
This course provides an overview of Business Information Systems. Students learn to apply Microsoft® Office tools including word processing, ...
http://www.beatcourse.com/bis-220-final-exam-answers.html
bis 220 final exam answers, bis/220 final exam answers, bis220 final exam answers, phoenix, bis 220 final exam help, bis 220 final exam, bis 220 final test
http://www.beatcourse.com/bis-220-final-exam-answers.html
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxclarebernice
COIT20262 Assignment 1 Term 1, 2018
Advanced Network Security Page 1 of 7
COIT20262 - Advanced Network Security, Term 1, 2018
Assignment 1
Due date: 5pm Friday 20 April 2018 (Week 6) ASSESSMENT
Weighting: 40% 1 Length: N/A
Instructions
Attempt all questions.
Submit the following on Moodle:
• Answers: A Microsoft Word document containing answers to the questions.
• File for Question 1: netcat.pcap
• Files for Question 2: screenshot-attack.png, screenshot-success.png
This is an individual assignment, and it is expected students answer the questions themselves.
Discussion of approaches to solving questions is allowed (and encouraged), however each
student should develop and write-up their own answers. See CQUniversity resources on
Referencing and Plagiarism. Guidelines for this assignment include:
• Do not exchange files (reports, captures, diagrams) with other students.
• Complete tasks with virtnet yourself – do not use results from another student.
• Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks)
or from other students.
• Write your own explanations. In some cases, students may arrive at the same numerical
answer, however their explanation of the answer should always be their own.
• Do not copy text from websites or textbooks. During research you should read and
understand what others have written, and then write in your own words.
Marking Scheme
Each sub-question is allocated marks in [square brackets].
Questions which require a specific answer will be marked on correctness.
Questions which require explanations will be marked on correctness, depth and clarity of the
answer. To receive full marks, the explanation must be correct, must include significant depth
to demonstrate understanding of the topic (but does not include irrelevant information), and
must be clear to the intended audience. Unless otherwise stated, assume the audience has a
background similar to Master of IT students that have successfully completed 1st year of study.
Questions which require diagrams will be marked on the correctness and clarity of the diagram.
Submitted files will be marked on correctness of the information included.
https://www.cqu.edu.au/student-life/services-and-facilities/referencing
COIT20262 Assignment 1 Term 1, 2018
Advanced Network Security Page 2 of 7
Question 1. Analysis of Protocols with Wireshark [11 marks]
For this question you must use virtnet (as used in the workshops) to study Internet
applications with Wireshark. This assumes you have already setup and are familiar with
virtnet. See Moodle and workshop instructions for information on setting up and using
virtnet, deploying the website, and performing the attack.
Your task is to:
• Create topology 5 in virtnet where:
o node1 will be referred to as the client
o node2 will be the router
o node3 will be the server
• Start capturing packets using tcpdump on the router (node2)
• W ...
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxjoellemurphey
REVIEW FINAL STUDY GUIDE
Question 1
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.
Answer
A.
microcomputer
B.
midrange computer
C.
mainframe
D.
supercomputer
E.
laptop computer
2 points
Question 2
The advantages of server virtualization include all of the following except:
Answer
A.
organization uses more servers to respond to quickly changing demands
B.
increased organizational agility
C.
focus of IT department shifts to services rather than supporting the technology
D.
cost savings
E.
reduced number of employees
2 points
Question 3
The _____ of computers used integrated circuits for storing and processing information.
Answer
A.
fifth generation
B.
second generation
C.
third generation
D.
first generation
E.
fourth generation
2 points
Question 4
_____ applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.
Answer
A.
A server farm
B.
The Internet
C.
Grid computing
D.
Utility computing
E.
Virtualization
2 points
Question 5
The _____ of computers used massively parallel processing to process information.
Answer
A.
fifth generation
B.
third generation
C.
first generation
D.
fourth generation
E.
second generation
2 points
Question 6
The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called:
Answer
A.
read-only memory
B.
cache memory
C.
registers
D.
flash memory
E.
random access memory
2 points
Question 7
The main types of primary storage are:
Answer
A.
register
B.
random access memory
C.
cache memory
D.
read-only memory
E.
all of the above
2 points
Question 8
Increased microprocessor complexity comes from which of the following?
Answer
A.
decreasing line width
B.
increasing transistor miniaturization
C.
using new materials for the chip that increase conductivity
D.
putting more transistors on the chip
E.
all of the above
2 points
Question 9
A(n) _____ offers you the option of shopping online with a disposable credit card number.
Answer
A.
credit card
B.
bank card
C.
driver's license
D.
debit card
E.
virtual credit card
2 points
Question 10
Software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings is best described as a(n) _____.
Answer
A.
anti-malware package
B.
anti-spyware package
C.
proactive monitoring package
D.
content-filtering package
E.
personal firewall
2 points
Question 11
Personal firewalls perform all of the following functions except:
Answer
A.
They should block outbound connections that you do not initiate.
B.
They should seek out the origin of malware in an attempt to block it in the future.
C.
They should make your computer invi ...
This course provides an overview of Business Information Systems. Students learn to apply Microsoft® Office tools including word processing, ...
http://www.beatcourse.com/bis-220-final-exam-answers.html
bis 220 final exam answers, bis/220 final exam answers, bis220 final exam answers, phoenix, bis 220 final exam help, bis 220 final exam, bis 220 final test
http://www.beatcourse.com/bis-220-final-exam-answers.html
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxclarebernice
COIT20262 Assignment 1 Term 1, 2018
Advanced Network Security Page 1 of 7
COIT20262 - Advanced Network Security, Term 1, 2018
Assignment 1
Due date: 5pm Friday 20 April 2018 (Week 6) ASSESSMENT
Weighting: 40% 1 Length: N/A
Instructions
Attempt all questions.
Submit the following on Moodle:
• Answers: A Microsoft Word document containing answers to the questions.
• File for Question 1: netcat.pcap
• Files for Question 2: screenshot-attack.png, screenshot-success.png
This is an individual assignment, and it is expected students answer the questions themselves.
Discussion of approaches to solving questions is allowed (and encouraged), however each
student should develop and write-up their own answers. See CQUniversity resources on
Referencing and Plagiarism. Guidelines for this assignment include:
• Do not exchange files (reports, captures, diagrams) with other students.
• Complete tasks with virtnet yourself – do not use results from another student.
• Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks)
or from other students.
• Write your own explanations. In some cases, students may arrive at the same numerical
answer, however their explanation of the answer should always be their own.
• Do not copy text from websites or textbooks. During research you should read and
understand what others have written, and then write in your own words.
Marking Scheme
Each sub-question is allocated marks in [square brackets].
Questions which require a specific answer will be marked on correctness.
Questions which require explanations will be marked on correctness, depth and clarity of the
answer. To receive full marks, the explanation must be correct, must include significant depth
to demonstrate understanding of the topic (but does not include irrelevant information), and
must be clear to the intended audience. Unless otherwise stated, assume the audience has a
background similar to Master of IT students that have successfully completed 1st year of study.
Questions which require diagrams will be marked on the correctness and clarity of the diagram.
Submitted files will be marked on correctness of the information included.
https://www.cqu.edu.au/student-life/services-and-facilities/referencing
COIT20262 Assignment 1 Term 1, 2018
Advanced Network Security Page 2 of 7
Question 1. Analysis of Protocols with Wireshark [11 marks]
For this question you must use virtnet (as used in the workshops) to study Internet
applications with Wireshark. This assumes you have already setup and are familiar with
virtnet. See Moodle and workshop instructions for information on setting up and using
virtnet, deploying the website, and performing the attack.
Your task is to:
• Create topology 5 in virtnet where:
o node1 will be referred to as the client
o node2 will be the router
o node3 will be the server
• Start capturing packets using tcpdump on the router (node2)
• W ...
Multiple ChoiceAnswer ALL questions form this section. This sect.docxrosemarybdodson23141
Multiple Choice
Answer ALL questions form this section. This section is worth 40 points total (1 point each)
Question 1 (1 point)
This term is used to describe any online content but ultimately includes digital transmittable text, graphics, audio, or video content.
Question 1 options:
A)
Social Media
B)
Digital Media
C)
Digital Design
D)
Motion Graphics
Save
Question 2 (1 point)
Which of the following is NOT true about journalism today?
Question 2 options:
A)
Stories created for one medium are likely to be found in other media.
B)
Few people nowadays rely on journalists for information about important events.
C)
The techniques for researching and writing stories continue to be important.
D)
The tenets of good journalism—critical thinking, clear writing and organized presentation—remain the same.
Save
Question 3 (1 point)
The components within Internet sites which facilitate the provisioning of information, provides the ability for consumers to interact/collaborate, and assists in navigating information online can be described as ____.
Question 3 options:
A)
Web Design
B)
Web Technology
C)
Digital Design
D)
Social Networking
Save
Question 4 (1 point)
The term that relates to the way technology conveys / transmits information between individuals, people and systems, or between systems is known as ___.
Question 4 options:
A)
Technological determination
B)
Communication theory
C)
Content delivery
D)
Technological theory
Save
Question 5 (1 point)
The theory that technology within a society will drive changes within cultural and societal structures can be best described as:
Question 5 options:
A)
Communication theory
B)
Technological determination
C)
Cultural changes theory
D)
Determination theory
Question 6 (1 point)
As the definition of social media develops, what is one underlying element?
Question 6 options:
The intersection between technology, social interaction, and sharing information
Microsoft is the primary developer.
Use of the various elements is free
None of the above
Save
Question 7 (1 point)
Blogs or weblogs are:
Question 7 options:
A)
Web pages of short, frequently updated postings by an individual that are arranged chronologically.
B)
Messages of 140 characters or less.
C)
A category for discussion groups within Usenet.
D)
A web page that allows anyone to edit it.
Save
Question 8 (1 point)
Social media audiences differ from those of traditional media because
Question 8 options:
A)
Traditional media audiences consume material created FOR them while social media audiences either dictate the type of product they want or bypass traditional producers to find products more suitable to their particular needs or desires.
B)
Traditional media audiences tend to be within a certain age, gender and socio-economic group, while social media appeals to virtually every age, gender and economic status.
C)
Social media audiences tend t.
1. ICT TRIAL EXAM 2012
Marking Scheme For Section A
Question No. CHIPS Answer Marks
1. C 1
2. False 2
3. i) J 3
ii) M 4
4. i) Computer fraud 5
ii) Copyright infringement 6
5. D 7
6. i) 220
8
ii) 1000000 9
7. i) B 10
ii) A 11
8. i) LAN 12
ii) Peer-to-peer 13
9. True 14
10. i) N 15
ii) Extranet 16
11. i) Fiber optic 17
ii) e-commerce, e-business 18
12. i) L 19
ii) N 20
13. False 21
14. B 22
15. Clarity 23
16. D 24
17. i) P 25
ii) Q 26
18. i) Double 27
ii) Area 28
19. RM 240 29
20. False 30
21. i) Procedure 31
ii) People/human/user 32
22. C 33
23. False 34
24. Query 35
25. Modify 36
TOTAL MARKS
2. Marking Scheme Section B
Trial Exam 2012
26. a. Cyber Law
b. Fraud – Having attention to take advantage over or causing loss to the
other people, mainly on monetary basis through the use of computer eg
email hoaxes, programme fraud, investment scheme, sales promotion,
hacking
1 mark
Fraud – 1m
Definition of fraud – 1m
Example of fraud – 1m
27 a. A- Presentation
B - Graphic
b. 2 Characteristics of OS
• software provided for use, modification and redistribution
• software that any programmer can download from the Internet for
• free and modify with suggested improvements.the only
qualification is that changes can't be copyrighted
1 mark
1 mark
Any 2
2 marks
28 a. B - Coaxial Cable
C – Fiber optic
b. No cost for physical medium
- Data can be sent to unlimited people – no network
- Data can be transmitted faster
- Wider area of coverage
1 mark
1 mark
Any 2
2 marks
29 a. Testing
The multimedia developers will use a checklist to test the
multimedia program. If there are any errors, the programmer will
fix the program.
b. Navigation/ interface / content.
Navigation –navigation aids and consistency
Interface – casper principles are used
Which are contrast, proximity, emphasis and
repetition
Content – the goals of the program, text, graphics, audio, video,
animation, language used and how informative the program is.
1 mark
1 mark for description
Any one and
explanation
2 marks.
30 a. Approach A – Structured approach
Approach B - Object –oriented approach
b.
A Differences B
Uses a top down
design model
Uses Uses object
Programmer
divides
programming
problem into
module
Emphasize The programmer
packages the
data and
function into
single unit ,
object
Medium
programming
project
Suitable for Large
programming
project
1 mark
1 mark
Any two differences
(2 Pairs) for 2
marks
3. Marking Scheme Section C
Trial Exam 2012
31. (a) Someone – perpetrators
- Category of perpetrators
Category Description
Hacker Someone who accesses a computer or network
illegally. They often claim the intent of their
security breaches is to improve security. They have
advanced computer skills.
Cracker Someone who accesses a computer or network
illegally, but has the intent of destroying data,
stealing information, or other malicious action.
They have advanced computer skills.
Script Kiddie Someone who has the same intent as a cracker but
does not have the technical skills and knowledge.
They are often teenagers.
Corporate
Spy
Someone who is hired to break into a specific
computer and steal its proprietary data and
information.
Unethical
Employee
Employees who break into their employers’
computers for a variety of reasons.
Cyber
Extortionist
Someone who uses e-mail as a vehicle for extortion
or libeling.
Cyber
Terrorist
Someone who uses the Internet or network to
destroy or damage computers for political reasons.
Perpetrators -1 m
1 category – 1m
1 discription – 1m
Total = 3marks
31. (b) Describe 2 ways how people to protect their computer (through
human aspects)
• User should be identified and authenticated
• Users should disable file and printer sharing on Internet
connection.
• Users should implement physical access control (looked
doors, windows and equipment)
• Users should use passwords, possessed objects and
biometrics.
• Any reasonable answer – action take by the human/user.
Any two and give
briefly explanation.
4 marks
(what action should
take by the human)
32.
Input Processing Output
Customer name
Model of the car
Price of the car
Down Payment
Number of Years for
the loan
Annual Interest
percentage
Loan = Price – Down
Payment
Monthly Instalment =
(((Loan x (Annual Interest
Percentage / 100)) x
Number of Years + Loan) /
(Number of Years x 12)
Monthly
Installment
Input – any 4 input for
4 marks
Processs – 2 formula
for 2 marks
Output – 1 output
For 1 marks
Total = 7 marks
4. 33.
33.
(a)
(i) Fill
(ii) Mak
(iii) Writ
Friend’
Friend ID
Name
Address
Date of B
(b) Create a
FRIE
NAM
ADD
DAT
in the fields
ke relationshi
te PK and FK
’s Info
D (PK)
irth
a form
FRIE
END ID
ME
DRESS
TE OF BIRT
into the table
ip ( one to m
K
END’S INFO
TH
A0
HA
No
Ta
25
15
e
many)
Pho
Tele
Frie
ORMATION
001
ASNUL BIN
o. 3 Lorong
aman Kg Pa
5200 Kuanta
5.05.1994
ne Number
ephone Num
end ID (FK)
N FORM
N AWANG
g 70,
adang 2,
an.
ber
G
Field i
(any 3
Field i
(all Cor
Label PK
make rel
Total =
Form T
Any 3 F
Sample
Draw for
Total =
in table 1
3) – 1 m
in table 2
rrect)– 1m
K & FK and
lationship –
1m
= 3 marks
Title – 1m
Fields – 1m
data – 1 m
rm in box –
1m
= 4 marks