Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
106 views
Ict A Marking Guide
A marketing guide for ict professionals
Uploaded by
sanyjospin64
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save ict a marking guide For Later
Download
Save
Save ict a marking guide For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
106 views
Ict A Marking Guide
A marketing guide for ict professionals
Uploaded by
sanyjospin64
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save ict a marking guide For Later
Carousel Previous
Carousel Next
Save
Save ict a marking guide For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 6
Search
Fullscreen
ICT 796 A LEVEL PAPER 1 MARK GUIDE te ae ar B—b.te fateh te— pa 8 Twte— tate pete fate ahs fs — 1st state chi a f6- Th Pe he ts Bt. ta tar Taf ta fet a bh los tata tote te CS ON a Ee © fats tote —tan-tp— ft 8 796 A* LEVEL PAPER 2 | Ari input’) [foupac] ‘The stored-program conecpt is one in which program instructions as well as their data are stored in memory, with the requirement that the treatment of programs and data in memory be interchangeable or uniform iti, 4) _ Intranet isthe internal network ofan organization which uses internet technology with access only to _members ofthe organization while extranet is that part of an organization's network with limited access to outside users. }) Internet is the interconnection of computer networks worldwide while www is the World Wide Web or the interconnections of web pages located in different servers worldwide. ©) Asswitch is capable of sending received data directly to the destination computer while data received through a hub goes through other computers ‘connected to it, to locate the destination computer, ‘The creation and use of computer viruses ‘The breaking of password systems Credit Card Fraud;This is the obtention and use of your credit eard number by unknown persons, Breaking of copyright and_piracy;This involves the cobienton and ilegal use of materials, files or software without prior authorization from the author. Cyber terrorism;This isthe use ofthe cyber space or internet to carryout terrorists acts which include destruction of eritical systems, information, goverment records, shutting down emails, etc, HackingsHackers are knowledgeable and experienced computer users who invade or break into other people's computer systems. There are two types of hackers. Cracking; Crackers are hackers (black hat hackers) who break into a computer system with evil motives of carrying out destructive Salami shaving and data diddling;Salami shaving is the use of a program by a programmer to subtract small amount of money from someone's account and sending such funds to the ‘embezzler’s account. Data diddling;Data diddling is the stealing of funds through the above method by insiders, but with modification of the data such that they would never be traced. Denial of service (Syn flooding); denial of service attack (DoS) involves overloading or bogging down an internet server by hackers suchthat it becomes overloaded and cannot ‘more funetion, Cyber Warfare:this is the act of using different methods to carry out warfare or attacks on others using the internet. ‘Spamming:spamming is the act of sending undesired or junk ‘mail to other persons” mail box, usually by commercial sites forthe advertisement of their products or 30. Character deformation assassination;This involves the use ‘of messages or other publications to paint one’s character as negative, by placing or posting them as if the massages were ‘coming from such a one whose character is deformed. Information warfare terrorismsThis involves the use of information technology to corrupt or destroy energy’ information or industrial system. ~ . FRAUD;This involves using the computer to carryout dreadful acts like manipulating company accounts, changing results ete is involves the physical stealing of components of an hardware, software ete) Scamming;This is carrying out false and itlegal business. deals on the internet with the aim of taking advantage of the party paying or giving out the goods or services Cyber statking;This isthe use of the internet, emails, ete to threaten oF harass a person repeated, Masquerading: This is the use of someone else's identity to access a computer by unauthorized persons,1 ‘Sexual predators/Pc , 7 ‘ornography;They make adverts, movies and enter chart rooms to lure others: ile i eco ‘others and people's childt sexual immorality and even commercial sex. ‘nine Session Hijacking;This occurs when an indivi 7 ‘an individual (e.g, a co- ‘worker) takes over another user's network. session” wien he/she goes somewhs it inating, hi pete ere else without terminating his or her 2-2. Decision Sup a sport Systems (DSS); These are syst which collect and report certain types of business a hich an help managers, make better decisions, The access and se [pf computers here, is decentralized pemntting managers to [fetteve data tht otherwise would not be availabe tthe, ore data tobe used in the future and to perform a variety of ‘what-if-analysis’ Types if decision support systems include: communications-driven DSS, Document-driven DSS, Knowledge-driven DSS, Model-driven DSS etc. Office Automation Systems;These are systems which make luse of computers and/or networks for carrying out various loperations such as_word processing accounting, documentation, communication etc. They are designed to help lusers manage’ information-related tasks more efficient Examples of Office automation systems include; those which are used in documentation, calculations recording data or statistics etc. ‘Transaction Processing Systems(TPS);A Transaction | Processing System is a data processing system which keeps a ‘careful record of an organization’s day-to-day transactions. Eg, the Automatic Teller Machine (ATM), | Health Information Systems (HIS);These are systems that fare used to manage hospitals as well as health related problems. They can be used to record disease trends over & Period of time for different geographical locations and Fifferent people groups so as to be able to deduce the actions to take. HIS is used in the public health sector. Systems _(EIS);AnBxceutive highly interactive MIS that helps lems and take advantage of | Executive Information Information system is & ‘managers to solve prot ‘opportunities. ibrary Information System (LIS);A library informs Tstem a an IS that is developed to help inthe management of Tunas, They are used to record information on the books rorarved, returned, stolen, etc. You may find L1S in public libraries or in schools. a) Whatisan array? In programming, It is a data s : | ot Reta values, al of the same type, any element of which can | be referenced by an expression consisting of the array name [followed by an indexing expression. Its also called a vector b) Asynchronous Data Transmission This is when the sending end of the transmission set each individual Character with a start and a stop bit to enable the fructure which represents a list receiver identify the characters of the message. An ‘example is the keyboard. ¢) Multiplexing: A technique used in communication tnd inputfoutput operations for transmitting a alimber of separate signals simultaneously over a ingle channel oF line, The signals can be separated by time, space or frequency: @) State and explain the ju ean infected computer Diseonnect the computer from any network or ws devices that may carry viruses. IBackup important Data in the computer if possible or Baclep Disk containing | Data. . Disconnect Local Disks and use an anti-Virus boot scanner to Iscan and clean infected disk, files or drives. Update System and application program files from a trusted source. instal a licensed and updated Antivirus the computer. If there Iwas one, uninstall. Ensure that only one Antivirus is installed at \efime, Don’t use outdated antivirus software. Most software can update freely through the internet. ete dat ha was backup up making sre that there is another backup source. Run your system. virus infection. + Install updated Antivirus = Always scan any storage device before opening it in the computer. + Use only software from legitimate source. = Avoid Games Sean email atachments and other downloads from the internet. = Watch out for freeware. 4 Avoid indiscrimate opening of files with pornographic stuff. Educate yourself regularly on computer security would tal 8) Data security involves the following: Confidentiality, integrity, availability. Explain each of those words Confidentiality is a term used to describe data that is kept secretly from any other users that should not have access to it unless permission is granted by the owner of the dat Data integrity or integrity is a term used to describe when data or computer files are kept clean and reliable without being erased or mistakenly changed. Data in the beginning should be identic to the one at end of the process. Availability: It is to prevent (minimize/mitigate risk of ) damage from attacks that make key systems/information becoming unavailable for legitimate purposes. Data should be always be available when itis needed,‘Tokesi Ring:Token rin, all computers on the net fashion. The term toke of information that is ‘computer on the netw the information is 16 OF 802.5 is a network where work re connecedinacirele 1 is used to describe a segment sent through that circle; when a fork is able to decode that token, 1965, @ packet is a segment of data sent from one SOmPUL oF network device to another computer oF network device over a network. A packet contains the source, dexiatan s Pe, dat, and other uefa packet get to its destination and then read. Another name for a packet is a datagram. Because packets are limited in size, most” data ‘ransmitted over a network is broken up into multiple packets before being sent out and then put back together when received. m Blogging : A Blog a Web site that has regular updated content reflecting the interes Of the ses host. Often, but not always, the content isin jour-nal form, has highlights of news and information from other Web sites, and is presented from a personal point of view. On some sites, the Weblog is a collaboration between visitors to the site, The act of publishing a content into a blog is blogging Robot:robot is used to describe a computerized machine designed to respond to input received ‘manually or from its surroundings. Today, robots are formulas used to solve a problem. algorithm must satisfy the following criter ae 1. input: there are zero or more quantities which are externally supplied; output: at least one quantity is produced; definiteness: each instruction must be clear and ‘unambiguous; . finiteness: if we trace out the instructions of an algorithm, then for all cases the algorithm will terminate after a finite number of steps; | effectiveness: every instruction must be sufficiently ‘that it can in principle be carried out by a person using only pencil and paper. Its not enough that each ‘operation be definite but it must also be feasible. ») Give £80 ithms Search algorithms: Linear search, random search, middle search, binary search Sort algorithms: bubble sort, insertion sort, selection sort, aquicksort, sort by merge, heap sort, Shell sort ©) Consider the following Algorithm, Start Get price of lem Get VAT rate VAT = Price of item * VAT rate Final Price = Price of lem + VAT Display Final Price commonly used to perform repetitive and difficult | Represent the rithm using Pseudocodes thi tasks such as building cars and even computer | Floweharts, | equipment. The term robot is also used to describe a | Flowchart, Pseudocode software program designed to perform tasks are ‘Algorithm price sutonatialy. Ge) Ve pe tem Neural Network: a neural network is a method of vat_rate, VAT, simulating intelligence based on how the human brain | /" Got ane price ot tem final_price receives and processes information, Because Neural Begin networks rely on parallel processing, standard Print(‘enter the computers are incapable of performing the tasks price of each item”) needed for neural networks and require special Read(price tem) hardware or processors. ae ee Prini(‘enter the ix. Data Protection Act: The Data Protection Act 1998 = Price of tem + vAT-ratel | rate of the item”) (DPA) is a in 3f Parliament which Read(var_rate) defines UK law on the processing of data on) [Finai price = price orstem + var| VAT identifiable living people. It is the main piece of price item . oo eee “i in the UK ee QUESTION7 = ea Define an Algorithm and give its qualiti Ce Display(Final_price) End i i f 1 algorithm is procedure consisting of a finite set o ‘ambiguous rules (instructions) which specify a finie 2guence of operations that provides the solution toa problem, 10-4 specific class of problems for any allowable ma & }Put quantities (if there are inputs). “ Cie is a step-by-step procedure to solve a giv Tan algorithm is a list of instructions, procedures, oF Indicate the control structures available in_your flow chart. ‘No control structure is used in this algorithm, ‘QUESTIONS= = ork aa eS 28 20 SaRe se =ar5, mom 8) Project management is the application of knowledge, skills, tools and technics to project activites in order to ‘meet project requirements. }) Gant chart in Project Management: it graphical i Pisteathe subtask of atk inprogene 4) The Pert Chart: itis management tool for Planning coordinating, and controlling large ‘Complex project such as master budget 1) Spiral’ Model: it is a model of soft. m are evelopment which combine the features of the prototyping model and the water fll model used in large expensive and complicated project ‘Waterfall Model: it sa linear and sequential ‘method in which the output of each phase became the input ofthe next phase: planning, analysis chine eapable of carrying out a complex series of action automatically and is programed 9 by a computer. Automobile companies and logistic companies °) Robots rarely ake ‘mistakes and are more precise than ‘They can work at a constant speed with no break ‘The can work with no problem in dangerous zones oOonrn—rr ‘QUESTION 9 4, Systems software: The set of programs designed to operate, control and extend the processing capabilities of ‘the computer while an application software isa software program design to perform a particular task. b. GUL GraphicalUser Interfice):is an interfacewhere the userissuescommends byusing a pointingdevice (€.g.mouse) to pointand click onicons, buttons,menus and listson the sezeen. WhileCLI(Command Line Interface): isa form of interface where the user types commands for the computer to carry out. ©. Batch processing system Batch processing was the very first method of processing which was adapted. The main purpose of this system was to enable the computer to move automatically from one job to another, without the operator having to intervene. Jobs (that consist of data and programs) are queued. The ‘computer would then process the jobs ‘one at atime without further human intervention. Batch processing i still used nowadays — Example printing thousands of m Real time system Immediate processing and up-to-date information are major characteristics ofa real-time system. Such a system, the information in files has tobe located very uickly, and the updating of records must be fast. ‘The system must be able to respond quickly to an enquiry ‘otherwise it becomes impractical. Ina realtime system a transaction is processed to completion atthe time is cccurs, ensuring thatthe information in the files reflects the true (real) situation Examples ofa real-time system would be: a flight reservation system, a banking system. 4, Peer-topeer all computer are at the same level they all Provide and request services from other computersend for client server network the elient only request for services from amore powerful, high speed computer known as the server. ‘+ A breakdown ofthe server leads to a breakdown of the ‘entire network Very expensive to set up. £. Machine dependent language it is the language understood by the computer and based on binary ie O and 1. The low level language (LLL) is machine dependent. 1g labels. Paper three Check candidate folder CD» Explain the use of the following in data protection and Security, i. arfitioning of hard drive: is the process to divide the hard drive into different part so that each one can be view as a whole disk. By partitioning the hard drive, it is then possible to separate data. from Programs in such « way that only the partition of rogram could be format what an error appears in the system, Data is then safe but is not kept out of the Physical damage ofthe hard drive, fi, Firewall: ‘A Firewall is a computer, a program or device that filters access to the network. It allows Company, for example, to protect its network to undesired intrusion from the Intemet — whilst Permitting its employees to get access to Internet services such as web and e-mail. Password: A password is a combination of characters used to prevent unauthorized computer access. It permits to assure that only the ‘ones _ Supposed to enter a system are actually doing it iv. Data encryption: It is the process of making data unreadable by other humans or computers for the Purpose of preventing others from gaining access to its contents, . In order to read or use the encrypted data, it must be decrypted, and only those who have the correct password or decryption key are able to make the data readable again, Back-up: Itis a data security measure. It is the act of creating a copy or copies of data such that in the event of system failure, the data would not be lost. “Today, there are dozens of different ways to backup ‘your information and mediums to keep your data, For ‘example, CD-R, DVD-R, USB thumb drives, ‘extemal drives, and in the cloud are some of the mast popular places to backup your data a ©) Define the following in fabases_ givin their diagrammatic re ion where available i) _Entityzwhich information need to. be stored Entities represent collections of things. Eg. Entity STUDENT ean represent a collection of stent wihin a school, Enis are mmc using a reetangle, ii) Attributes: These are the smallest units ‘characterise an entity. For example student ean have the following attributes: name, date_of birth, class, address, Its represented by an oval {if)Relation: association between common fields of ©) An 8GB flash disk is formatted ortert Subject Student = Allare type of RAM = Allare volatile Differences ~ SRAM sands for Static Read Only Memory and DRAM stands for Dynamic Read Only Memory . within an integrated circuit and SRAM uses bistable latching ciruitry to store each bit. DRAM must be periodically refreshed. + SRAM is faster than DRAM, > SRAM more expensive, > SRAM consume last power than DRAM ») Diseu Je stating clearly what hapnensat 1) Fetching: Before the CPU can execute an instruction, the control unit must retrieve or fetch a command or data from the computer's memory. 2) Decoding: Before a command can be executed, the ‘control unit must decode the command into instruction set. 3), Executing: When the command is executed, the CPU carried out the instructions in order by converting them into macrocode, 4) Storing: The CPU may be required to store the result of instruction in memory. ig the FAT file system and known to lose 0.57 GB of disk space in the process. 4) What accounts for the disk space loss? ~ Gap batween sectors: Since the hard dive is. divided ino sectors during the formatting process, the indicating the limit of each sector actually occupy space ‘onthe disk ~ Used by the FAT. The file allocation Table resides also on the disk, thus occupy spaces on that disk. Wh enti tthe disk? = You may want to change to a new file system = You may want to gain disk space using a type of formatting switch. Use Format [Drive] /[Drive}size different tables. Frequently, a meaningful relationship exists (ize = Sector Size which may be 512, 1024, 2048 between two different types of entity. For example: | ‘You may want to free your computer from viruses STUDENTs attend a SCHOOL, STUDENTS offer SUBJECT | = You may want to insall a new operating system oF to It is represented by a diamond ‘upgrade an old one Use an ERD to illustrate these. - You may want to install another OS or use another partition for a security purpose Question 4 {il) 1a cluster of this Flash is 2048 bytes how many. a) State the similarity and differences between SRAM slusters will be available for use? and DRAMSpace available for datainGB: — 8GB - 0.57 GBXOR 7.4308 5 he ‘Conversion into byte: 7.43GB X 1000 obi Fealize that the truth table eel 1000 = 7430000000 bytes
You might also like
Cyber Threats and Security
PDF
No ratings yet
Cyber Threats and Security
17 pages
Cyber Security 1
PDF
No ratings yet
Cyber Security 1
19 pages
WK-10-Information Security and Cyber Crime
PDF
No ratings yet
WK-10-Information Security and Cyber Crime
27 pages
Define
PDF
No ratings yet
Define
5 pages
Unit 8 Information Security and Cyberlaw
PDF
No ratings yet
Unit 8 Information Security and Cyberlaw
11 pages
Module 4 Computer Crimes
PDF
No ratings yet
Module 4 Computer Crimes
49 pages
System Design and Analysis - Information Security and Cyber Crime
PDF
No ratings yet
System Design and Analysis - Information Security and Cyber Crime
29 pages
Chap 7 Fcs 0063
PDF
No ratings yet
Chap 7 Fcs 0063
46 pages
Security 01
PDF
No ratings yet
Security 01
26 pages
MIS 7th Edition Bidgoli Solutions Manual 1
PDF
100% (43)
MIS 7th Edition Bidgoli Solutions Manual 1
36 pages
MIS 7th Edition Bidgoli Solutions Manual 1
PDF
100% (66)
MIS 7th Edition Bidgoli Solutions Manual 1
22 pages
Chapter10-Issuesandtrend
PDF
No ratings yet
Chapter10-Issuesandtrend
51 pages
MIS 6th Edition Bidgoli Solutions Manual 1
PDF
100% (47)
MIS 6th Edition Bidgoli Solutions Manual 1
36 pages
R22_III_I_CRYPTOGRAPHY AND NETWORK SECURITY
PDF
No ratings yet
R22_III_I_CRYPTOGRAPHY AND NETWORK SECURITY
185 pages
Chapter 1
PDF
No ratings yet
Chapter 1
31 pages
Security
PDF
No ratings yet
Security
5 pages
Skill Development Week Lecture Slides
PDF
No ratings yet
Skill Development Week Lecture Slides
55 pages
IST1101 Ch4 IS Ethics part 2
PDF
No ratings yet
IST1101 Ch4 IS Ethics part 2
34 pages
IT Application Tools in Business - Module 1
PDF
No ratings yet
IT Application Tools in Business - Module 1
7 pages
Presentation MIS
PDF
No ratings yet
Presentation MIS
32 pages
Chapter 7. Network Security
PDF
No ratings yet
Chapter 7. Network Security
42 pages
Chapter 7. Network Security
PDF
No ratings yet
Chapter 7. Network Security
42 pages
AISE KS
PDF
No ratings yet
AISE KS
17 pages
Lesson Notes Spocial Impact
PDF
No ratings yet
Lesson Notes Spocial Impact
11 pages
INFORMATION SECURITY
PDF
No ratings yet
INFORMATION SECURITY
43 pages
L3 Computer Crime and Computer Crime Act
PDF
No ratings yet
L3 Computer Crime and Computer Crime Act
47 pages
Computer Crime: What Is Security ?
PDF
No ratings yet
Computer Crime: What Is Security ?
49 pages
Securing Information Systems
PDF
No ratings yet
Securing Information Systems
19 pages
Data Security and Control
PDF
No ratings yet
Data Security and Control
6 pages
Lecture 1
PDF
No ratings yet
Lecture 1
29 pages
Objective 1: Describe Ways in Which Information Technology Impacts The Society
PDF
No ratings yet
Objective 1: Describe Ways in Which Information Technology Impacts The Society
14 pages
Security, Ethical & Societal Challenges of IT
PDF
No ratings yet
Security, Ethical & Societal Challenges of IT
48 pages
it-funda-reviewer-finals
PDF
No ratings yet
it-funda-reviewer-finals
29 pages
Introduction To Information and Communication Technology Lecture 5
PDF
No ratings yet
Introduction To Information and Communication Technology Lecture 5
7 pages
Mis Assi Orginal
PDF
No ratings yet
Mis Assi Orginal
14 pages
Information System Security
PDF
No ratings yet
Information System Security
40 pages
Control and Risk - Computer and Fraud Techniques
PDF
No ratings yet
Control and Risk - Computer and Fraud Techniques
17 pages
unit 2 CS (1)
PDF
No ratings yet
unit 2 CS (1)
41 pages
Cyber Crime: Presented By-Group - 6
PDF
100% (1)
Cyber Crime: Presented By-Group - 6
51 pages
Security
PDF
No ratings yet
Security
7 pages
Unit Internet Security
PDF
No ratings yet
Unit Internet Security
29 pages
Security: Challenges/Threats To Is Security
PDF
No ratings yet
Security: Challenges/Threats To Is Security
16 pages
Security Issues: Past & Present
PDF
No ratings yet
Security Issues: Past & Present
41 pages
Chap 1 Nis
PDF
No ratings yet
Chap 1 Nis
17 pages
Computer Security Ethics and Privacy
PDF
No ratings yet
Computer Security Ethics and Privacy
55 pages
0 - Security and Control in Information System 12-13
PDF
No ratings yet
0 - Security and Control in Information System 12-13
26 pages
Jhpolice Cyber Crime Investigation
PDF
No ratings yet
Jhpolice Cyber Crime Investigation
22 pages
Resume
PDF
No ratings yet
Resume
2 pages
Computer Security and Safety
PDF
No ratings yet
Computer Security and Safety
17 pages
MIS-Unit 5
PDF
No ratings yet
MIS-Unit 5
48 pages
It Application Tools in Business Bsa
PDF
No ratings yet
It Application Tools in Business Bsa
10 pages
Unit 5
PDF
No ratings yet
Unit 5
58 pages
ICT and Society
PDF
No ratings yet
ICT and Society
13 pages
CS Model Answer
PDF
No ratings yet
CS Model Answer
13 pages
System Vulnerability and Abuse: Security
PDF
No ratings yet
System Vulnerability and Abuse: Security
23 pages
R18CSE4101 Cryptography Network Security
PDF
No ratings yet
R18CSE4101 Cryptography Network Security
184 pages
4rev Ict136
PDF
No ratings yet
4rev Ict136
1 page
Information Security Issues
PDF
No ratings yet
Information Security Issues
24 pages