Upss1 f4 Ict 2016

12
CONFIDENTIAL 3765/1 ANSWER SHEET SECTION A Question No Candidate’s Answer Marks 1 i. A = 1 ii. B = 2 2 3 3 i 4 ii 5 4 i. 6 ii. 7 5 i. 8 ii. 9 6 10 7 i. 11 ii. 12 8 i. 13 ii. 14 9 i. 15 ii. 16 10 i. 17 ii. 18 11 i. 19 ii. 20 12 21 13 22 14 23 15 ii 24 iii 25 16 26 17 i. 27 ii. 28 18 29 19 i 30 ii 31 20 i. 32 ii. 33 21 i. 34 ii. 35 22 36 23 37 24 i. 38 ii. 39 1

Transcript of Upss1 f4 Ict 2016

Page 1: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 1/12

CONFIDENTIAL 3765/1

ANSWER SHEET SECTION A

Question No Candidate’s Answer Marks

1 i. A = 1

ii. B = 2

2 3

3 i 4ii 5

4 i. 6

ii. 7

5 i. 8

ii. 9

6 10

7 i. 11

ii. 12

8 i. 13

ii. 14

9 i. 15ii. 16

10 i. 17

ii. 18

11 i. 19

ii. 20

12 21

13 22

14 23

15 ii 24

iii 25

16 2617 i. 27

ii. 28

18 29

19

i 30

ii 31

20 i. 32

ii. 33

21 i. 34

ii. 35

22 36

23 3724 i. 38

ii. 39

1

Page 2: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 2/12

CONFIDENTIAL 3765/1

iii. 40

SECTION A [4 MAR!S"

 Answer a## questions. Write your answers in the spaces provided in Answer S$eet. ach

answer carries one !ar".

1. #i$ure 1 show two techno%o$ies used in the $enerations o& co!puters.

'ased on #i$ure 1( state the $eneration o& co!puter usin$ techno%o$y

)i* A

)ii* '

2. +tate the na!e o& the &irst $eneration co!puter. ,,,,,,,,,,,,,,,,,, 

3. -o!p%ete the &o%%owin$ state!ent

/n&or!ation and -o!!unication echno%o$y is the use o& co!puters( ,,,,,)i*,,,,, 

devices and ,,,,,,,)ii*,,,,,,,app%ications &or processin$( storin$( retrievin$(

protectin$ and trans!ittin$ in&or!ation &ro! anywhere at any ti!e.

4. 'ased on &i$ures e%ow( state the co!puter $eneration %eve%

2

 NAME : _____________________________ 

CLASS : _____________________________ 

IC NO : _____________________________ 

X

 Y 

Page 3: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 3/12

CONFIDENTIAL 3765/1

i. ............................. ii. .............................................

5. a%e 1 shows the usa$e o& /- in dai%y %i&e.

a%e 1

atch A( ' or - with the &o%%owin$ state!ents.

)i* -o!puters are used to &aci%itate production p%annin$ and contro% syste!s.

)ii* -o!puters are used to enhance %earnin$ and $ive interactive eperiences.

6. #i$ure 1 shows the usa$e o& /n&or!ation -o!!unication and echno%o$y in two

di&&erent &ie%ds.

 Activity o& echan$in$( uyin$ and se%%in$ o& co!!odities in %ar$e sca%e

invo%vin$ transportation &ro! p%ace to another. ransaction is done without

!eetin$ a person.

rovide on%ine services such a &und trans&er and i%% pay!ent. ransaction

can e done at any ti!e and any p%ace.

'an"in$

#i$ure 1

'ased on state!ent in #i$ure 1( state the na!e o& &ie%d

7. a%e 1 shows the characteristics o& and in co!puter usa$e $uide%ine.

ora% $uide%ines &or co!puter users. u%es &or co!puter users.

o pena%ty or punish!ent. ena%ties or punish!ents i!posed.

.

a%e 1

'ased on a%e 1( state

)i*

)ii*

8. +tate!ent e%ow is aout co!puter ethics. +tate whether the &o%%owin$ state!ents isTrue or %a#se.)i* -o!puter users !ust &o%%ow the co!puter ethics to avoid %e$a% action.

)ii* A syste! o& !ora% standards or va%ues used as a $uide%ine &or co!puter users is"nown as cyer %aws.

3

Page 4: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 4/12

CONFIDENTIAL 3765/1

9. a%e 1 shows the characteristics o& the operation !ode in -o!pany A and -o!pany '.Co&'an( A Co&'an( B

- sin$ i%%oard to advertise new

product

- eceive custo!er order y

te%ephone

-  A%% transactions recorded in &or!s

- ro!ote new product at

co!pany:s wesite

- eceive custo!er order y e!ai%

-  A%% transactions recorded in

e%ectronic &or!s

a%e 1

'ased on a%e 1( state the operation !ode use in

i. -o!pany A

ii. -o!pany '

10. a%e 2 shows ter!s which are re%ated to co!puter ethics and %e$a% issues

 A rivacy

' /nte%%ectua% property

- -yer ;aw

< -o!puter ethics

a%e 2

'ased on a%e 2( write A( '( - or < to !atch the &o%%owin$ state!ents

)i* +tandards !ora% conduct in the use o& co!puters

)ii* he ri$ht o& and individua% to restrict the co%%ection and use o& persona% data

11. #i$ure 1 shows in&or!ation on two types o& authentication !ethods.

'ased on &i$ure 1( state the na!e o&

i.

ii. =

12. Words( na!es( sy!o%s( device and i!a$es that represent products( $oods or services

can e protected under the ,,,,,,,,,,,,,,,,.

 A atent ' <esi$n

- -opyri$ht < rade!ar"

13. >>>>>>>>..is the act o& provin$ or disprovin$ the correctness o& a syste! with

4

 Authentication !ethod

=

ai services oo"in$urchase usin$ credit card ? etina% scannin$? voice reco$nition

Page 5: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 5/12

CONFIDENTIAL 3765/1

respect to a certain &or!a% speci&ication.

 A. Authentication -. @eri&ication

'. 'io!etric <evices <. +ite '%oc"in$

14. #i$ure 1 shows one type o& io!etric device.

'ased on #i$ure %(

)i* +tate the na!e o& the device.

15. #i$ure 3)a* and #i$ure 3)* show io!etric authentication !ethods.

#i$ure 3)a* #i$ure 3)*

'ased on #i$ure 3)a*( and #i$ure 3 )* states the !ethods used.

)i* #i$ure 3)a*

)ii* #i$ure 3 )*

16. +tate whether the &o%%owin$ state!ent is rue or #a%se.

'ased on the tet( the %o$$er has co!!itted a cri!e re%ated to porno$raphy.>>>>>>>>>>>>>>.

17. We need co!puter ethics and %aws to $uide users &ro! !isusin$ the co!puter. +tate

whether the &o%%owin$ state!ents is True or %a#se.

i. sin$ !ateria%s &ro! wesites as a resource &or assi$n!ent without $ivin$ credit

to the ori$ina% author is considered unethica%.ii. +e%%in$ pirated so&tware to a &riend is an ea!p%e o& %aw rea"in$.

5

 A %o$$er in ua%a ;u!pur was &ined 10( 000 y the court ecause he has

posted a &a%se state!ent re$ardin$ po%itician receivin$ ries in his %o$.

Page 6: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 6/12

CONFIDENTIAL 3765/1

18. #i$ure 2 shows part o& an a%$orith! &or a we pa$e &i%ter.

#i$ure 2

+tate the &i%terin$ !ethod used in the a%$orith! >>>>>>>>>>..

19. #i$ure 1 shows the "eyword %oc"in$ process

#i$ure 1

6

START

Use !""ess !

#e$ %!&e

C'()!*(e+

 $!((e+ #'+s,

STO-

A

C

ES NO

Page 7: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 7/12

CONFIDENTIAL 3765/1

'ased on &i$ure 1 write A( ' or - to !atch the &o%%owin$ state!ent

i. a$e down%oad stops

ii. +earch &or anned words

20. atch each o& the ter!s e%ow to the correct state!ent.

)orno*ra'$( S#ander  

)i* -an %ead to cri!ina% acts such as ep%oitation o& wo!en and chi%dren.)ii* -an %ead to unnecessary ar$u!ent

21. a%e 1 shows the ter!s used in co!puter security

 A eyword %oc"in$

' +ite %oc"in$

- We atin$ syste!< Bac"ers

he&t

a%e 1

'ased on a%e 1( write A( '( -( < or &or the &o%%owin$ state!ent.

)i* %nternet &i%terin$ !ethod that is used to prevent prohiited wesite &ro! ein$

accessed or opened y consu!er>>>..

)ii* ichea% runs o&& on coursewor" that is down%oaded &ro! internet and c%ai!ed

that it is his wor">>>

22. +tate whether the &o%%owin$ state!ent is True or %a#se.

-oo"ies ena%e we sites to co%%ect in&or!ation aout your on%ine activities and store

the! &or &uture use. hen( the co%%ected detai%s wi%% e so%d to any co!pany that

requests &or it.

23. 'e%ow are the ea!p%es on how the co!puter techno%o$y threatens the privacy o& our 

data.

/ +pyware // -oo"ies

/// hishin$ /@ #irewa%%

 A. /( // and ///

'. /( // and /@

-. /( /// and /@

<. //( /// and /@

24. atch each state!ent e%ow with the correct ter! y writin$ A( ' or -.

 A rs. +hei%a received an e!ai% statin$ her an" dec%aration in&or!ation !ust e

updated ecause there is an attac" on the an" account. o update( she !ust &o%%ow

the instructions &ro! the e!ai% received.

' Basnu% &ind an on%ine an" account o& his &riends( a!%an have not een c%osed.

Basnu% too" the opportunity to trans&er 100 to hir an" account. Basnu% ta"e on%y

100 ecause a!%an owe hi! that !uch.- aria! uses so&tware that auto!atica%%y down%oads the son$ &ro! the internet. he

7

Page 8: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 8/12

CONFIDENTIAL 3765/1

son$s down%oaded are saved and she so!eti!es so%d to his &riends as rin$tones.

-o!puter the&t >>>>..

-opyri$ht in&rin$e!ent >>>>..

-o!puter &raud >>>>..

SECTION B [+ MAR!S"his section consists o& ,i-e questions. ou are required to answer a## questions.

Question +.

+tate a di&&erence etween the education e&ore /- and education with /-.

 

a.

 C2 !ar"sD

  . ;ist WE sectors that use /- in dai%y %i&e.

C2 !ar"sD

Question +/

he +tate!ent in a%e 1 is aout co!puter conducts.

udy is a -o!puter +cience student in a university. Be secret%y uses his &riendFs e?!ai%

/< to send a threatenin$ e?!ai% to one o& his course !ate.

'ased on the state!ent(

)a* +tate the conduct that is considered as

)i* nethica%

8

ducation with /-ducation e&ore /-

Page 9: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 9/12

CONFIDENTIAL 3765/1

)ii* ;aw rea"in$

C2 !ar"sD

)* +tate two di&&erences etween the conducts in )a*.

Et$i0s 1aw

C2 !ar"sD

Question +2

+tate!ent 2 shows how edai !as -orporation hand%es its security procedure

+tate!ent 2'ased on +tate!ent 2(a. )i* +tate the !ethod o& authentication used y edai !as 999.

C1 !ar"D

)iii* Give WE other ea!p%es that can e used y edai !as 999 as a securitycontro% device.

C2!ar"sD

. +tate another !ethod o& authentication that can e app%ied in edai !as 999.

9

edai !as 999 is the ranches o& $o%d shop own y !as -orporation. he !ana$er o& edai !as 999 has &ied &in$er print scanner device at $o%d stoc" roo! as a stepso& security contro%.

Page 10: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 10/12

CONFIDENTIAL 3765/1

C1!ar"D

Question +3

#i$ure 3 )a* shows a student sur&in$ the /nternet in the schoo%. #i$ure 3 )* shows part o& the

we rowser screen disp%ay when he tries to access the ; in #i$ure 3 )a*.

 

10

Page 11: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 11/12

CONFIDENTIAL 3765/1

#i$ure 3

'ased on #i$ure 3(

)a* p%ain the type o& &i%terin$ used

C2 !ar"sD

)* +tate two ne$ative e&&ects on the student i& he is a%e to access the we site

C2 !ar"sD

Question +

 Answer the &o%%owin$ questions ased on the situation e%ow.

a* Who has co!!itted in co!puter cri!eH +tate the type o& co!puter cri!e he:she has

co!!itted.

C2 !ar"sD

* Iusti&y you answer.

11

Iu%ia has purchased co!!ercia% app%ication so&tware and she up%oads the so&tware to

her we &or others to down%oad it

Iohan has down%oaded open source app%ication so&tware &ro! the internet. Be then

dup%icates the so&tware and distriutes to his &riends.

Page 12: Upss1 f4 Ict 2016

8/18/2019 Upss1 f4 Ict 2016

http://slidepdf.com/reader/full/upss1-f4-ict-2016 12/12

CONFIDENTIAL 3765/1

C1 !ar"D

c* ;ist another type o& co!puter cri!e C1 !ar"sD

EN5 O% Q6ESTIONS

12