0% found this document useful (0 votes)
75 views10 pages

CSC208 1

Uploaded by

adeshewaawodele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
75 views10 pages

CSC208 1

Uploaded by

adeshewaawodele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
BELLSUNIVERSITY OF TECHNOLOGY OTA, OGUN STATE, NIGERIA COLLEGE OF NATURAL AND APPLIED SCIENCES DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Course Code: CSC 208-IT and Society @ Unit) 2018/2019SECOND SEMESTER EXAMINATION e Answer ALL Questions in SECTION A e Answer ANY TWO (2)Questions in SECTION B © Section A carries 25 marks while cach Question in section B carries 22.5 marks each. e Clear schematic illustrations, where required/necessary, also carries marks. TIME ALLOWED: 2 Hours meats SECTION A i improved and evolved to facilitate our daily 1, Communication hes imp: x Activites b. Communication c. Interactions d. Technologies e, a . Movements 2. The inventions of cellular phones, devices are important in enhancing a. Transportation. b. Communication c. I Education 3, ICTs the technology required for ... mrocessing, . 5 Data b. File c. Test d. Text e. Information 4 eee _ refers to the knowledge obtained from reading, investigation, study or research. a. Knowledge b. Information c. Data d. Raw facts e. Ideas television and other electronic ideas d. Discoveries e. 5. The following are tools for transmitting information except, 2 a. Keyboard b. Phones c. Television d. Radios e. Tablets 6. Communication is an act of transmitting .. a. Information b. Signals c. Messages d. Ideas e. Motives ion includes the following 7. Some old means of communi: except? a. Signs b. Pigeon c. Poetry d. Smoke e. Letter-writing 8. The Sumerians was developed in ... a. 3500 b. 3500 AD c. 3500 BD d. 3500 BC e. 3500 AC was developed. Phoenicians d. Vacuum tubes ¢. 9. In 1500 BC, the a. Abacus b. Sumerians Egyptian bones ‘BUTICOLNASICSC 208/EXAM Jun 2019 10. The Tsai Lun of China inves a. 1500 BC b. 15OBC e. 1500 aD ad Tega eos Be 11. The First Printing Machine w, a. 1454 b. 15446. S414. 14550 1ah ne 12. The Telegraph line was invented i a. 1979 b. 1993 6.1793. 17926 1795 13. When was the first Television made public? a, 1922 b. 1924 c. 1925 d. 1927 ¢. 1921 14 When was the first Telephone made public? a. 1876 b. 1870 c. 1825 d. 1827 e. 1821 15. The Computer was created in ... a. 1922 b. 1944 c. 1940 dj 1941 ©. 1921 16. ... Was introduced in 1958. a. Typewriter b. Scanner c. Mobile phones d. Vacuum tubes e. Photocopier Pick the correct Year | Choose from the list ‘Ja | Machine or Founder or Location | below 17_| Chinese Abacus 1963, 18 | Egypt Abacus Harvard University 19 | Napier’s Bones X 1620 Gottfried Wilhelm 20 | Pascaline Charles Babbage 21_| Leibniz’s Rechner 22_| Weaving Loom 1653 23 | Mechanical Caleulator Joseph Marie 24_| Mark T 300 BC 25_ | Commumication Satellite 1569 26 | Arpanet Ke00Bc Pg raters used the following First-generation comp aang emu cubes, punched card and .. tt sic discs b. magnetic storage ¢. magnetic tapes d. mages c a, magne! tubes e. silicon tapes og, what was the technology used 10 transfer signals in the secon. ration computers? : ; 4. Resistor b. transistors ¢- Circuits d. capacitors e. Arduino boards 49, John Bardeen, William Shockley and Jargon scientists ofthe second-generation computer, sarValter Houser b. Walter Brattain c. Houser Brattain d, Walter Houser Brattain e. Walter 50, Smal silicon chips was a major component in which generation of computer? yo a OES ty the a. 1 generation b. 2™ generation ¢. 3°° generation d. # generation, e. 5” generation fachwny [Sav [COMPUTERS WHAT PICK FROM THIS Gexeration —_| Hist Fi_| 1BM370 SERIES. __) GENERATION 37] SUPER COMPUTERS 28° GENERATION = [at 31 | MANRANE COMPUTERS, 3*° GENERATION Pusat 36] MIs COMOTTERS 4™ GENERATION 3 RoR Se] MART 33 [ TRANSISTOR COMPUTERS "GENERATION TAPE at WACUORTTORES 42 [PERSONAL 6™ GENERATION courts [BELL [s¢Tepc 700) — 46, An example of patent for inventions ty b. Games c. a Uilty b. Games e. Names d. Logos. writings 447. Am example of Trademarks for brand identi following except identity includes the a. words b. Names c. Symbols d, Images e. Designs 48, Which of the three (3) is under Design for h product appearance? a. music, film & Sound b. Literary, names &design ines 8 . h ©. pl : lant, tines & d. texture, colours & utility e, word, names & multimedia 49, Privacy in IT refers to? a. personal data b. Multimedia. Files d. data & Information e.tus data 50. Information privacy is described as the Tight to .........and + Aecoss & keep b. store & restrict c. Deny & Restrict d. Lock & Unlocke. Encrypt & Decrypt i SECTION B Question One a. What do you understand by Privacy in Computer usage? (2.5 mks) b. Explain THREE (3) means by which technology has negatively affected the privacy of data. (10 mks) c. Write a short note on Technology stating the two distinct functions with respect to communication. (10 mks) Question Two a. How has ICT helped the society in the area of education with reference to the following people: i. Teachers ii. Student iii. Researchers iv. School Administrators (12 mks) b. Explain the following: i. Data creation ii. Data preparation iii. Data transmission (10.5 mks) Question Three a. What sole is ICT playing in the daily task of the following: i. E-commerce stake holders ii. Suppliers iii. Employees iv. E-commerce customers (12.5 mks) b. Discuss five impact of ICT on the society (10 mks) Question Four a a. -i. What is the impact of ICT in the society when banking is concerned? (4.5 mks) \ oO ro ii. Tailor your discussion on the following people: Bank ry Customers, Businessmen and Bank Administrator (9 mks) Pr gh ye & b. With the aid of two examples each, explain three data processing methods.(9 mks) ——— BUT/COLNAS/CSC 208/EXAM June 2019 BELLSUNIVERSITY OF TECHNOLOGY OTA, OGUN STATE, NIGERIA ae OF NATURAL AND APPLIED SCIENCES PARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Course Code: CSC 208 - IT and Society Unit) 2021/2022 SECND SEMESTER EXAMINATION Read the following instructions carefully e Answer any Five Questions All Questions carries equal mark. e Every other question carries 14 marks each TIME ALLOWED: —2!?Hours Fa paiiectececee ee _— Question One , _ Technology is vital in communien; * communication and spreads ne be these two 2) futons ae achjernsten Be ads ICT has impacted every area of oe (Sm how brought about changes. Briefly gre ty yy, hs een impacted (S mks) sow ih List and explain Three (3) impact tchen Society(4 mks) FICT ong Question Two «Write short note on the social . 5 proble: sing a suitable example. (4.5 mks) 4 CT BS causes ji, Computer ethics are moral guidelines as tse of computer and computer network. Geonee™ the justifications for the need of computer ethics = @) iii, With two (2) examples each, highlight tet mig) types of Intellectual property protection, (S miay™ Question Three quitter’ Our privacy in this age is constantly under thea fro ‘various places. Discus three popular ways your privacy is threatened. (4.5 mks)_ a ‘One of the ways to secure our privacy is to ensure that authentication is enforced. Briefly discuss the concept of authentication. (4.5 mks) V#\'S Wengetg eters How does the Biometric means of authebiication {iter fiom the call-back system of authentication? (5 mks) Question Four i. Using the ATM as an example how is the process of identification and verification achieved? (5 mks) ii, fyouare the administrator of the website to a primary school where Internet is used, what concept will you _ BUTICOLNASICSC 20972 EXAM 2022 students do not have access to ‘the intemet? (mks) , keyword blocking or site response. (4:mks) adopt to ensure the immoral content on ji, What will you propos blocking? Justify your Question Five (oe x efimes? (4.5 mks) esor W Highlight the following into the different categories o Computer crimes: Hacking, Impersonation, Conuthorised acess to personal compute. (4.5 mks) iii, Which ofthe categories in five (i) do you consider as causing the worst damage? (5 mks) i. What are computer Question Six Computer security has become a necessity in the present time. Explain Computer Security. (5 mks) List and explain three (3) type of Computer Security. 65 mks) ‘Asa Computer Administrator in a school where Students bring their laptop to school every time it is needed, What type of computer security measuirg will you recommend the school management to adopt and why? (.5 mks) e i, ii iii, ~~ Question Seven Explain the term Computer threats? (2.5 mks) Itemize five (5) type of malicious codes that serves as threat to the computer system . Briefly describe two(7.5 mks) State two (2) differences each between worm and Virus. (4: mks) \y vant SECTION B Question One a. What do you understand by Privacy in Computer usage? (2.5 mks) b. Explain THREE (3) means by which technology has negatively affected the privacy of data. (10 mks) c. Write a short note on Technology stating the two distinct functions with respect to communication. (10 mks) juestion Two a. How has ICT helped the society in the area of ‘education with reference to the following people: i. Teachers ii. Student iii, Researchers iv. School Administrators (12 mks) b. Explain the following: i. Data creation ii. Data preparation iii. Data transmission (10.5 mks) Question Three a. What pole is ICT playing in the daily task of the following: i. E-commerce stake holders ii, Suppliers iii. Employees iv. E-commerce customers (12.5 mks) b. Discuss five impact of ICT on the society (10 mks) Question Four a. -i. What is the impact of ICT in the society when banking is S concerned? (4.5 mks) 7 eo ii. Tailor your discussion on the following people: Bank ¥ Ss Customers, Businessmen and Bank Administrator (9 mks) re b. With the aid of two examples each, explain three data processing methods.(9 mks) BUT/COLNAS/CSC 208/EXAM_June 2019 BELLS UNIVERSITY OF TECHNOLOGY OTA,.OGUN STATE, NIGERIA COLLEGE OF NATURAL AND APPLIED SCIENCES DEPARTMENT, OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Course Code: CSC 208 — IT and Society G Units) 2020/2021 SECOND SEMESTER EXAMINATION Read the following instructions carefully ¢ Answer any FIVE questions © Use Schematic diagram/figure/table where necessary TIME ALLOWED: 2! Hours © 208/EXAM_AUG 2021 QUESTION ONE The impact of Information and Communication Technology GCT) has hed a tremendous effect on our lives. Briefly explain ICT as it relates to our lives? (5 mks) b. What is Technology as it relates to ICT and Society? (4 mks) ©. State two (2) ways technology is vital in communication and gives an example in each case. (5 mks) (14 marks) QUESTION TWO (14 marks) . a. In each sector of the society listed below, give two advantages and . two disadvantages of ICT/Technology application in that sector: (6 mks) i, Education ii Medicine if, Crime b. Itemize five (5) impacts of ICT on the society (5 mks) © Discuss how Technology has brought about a paperless ————environment,-(3-mkes) ASUESTION THREE a. What do you understand by Computer/professional Ethics and how is it different from law? (5 mks) + b. How does Ethic and Law help to achieve Privacy? (S mks)* ©. State two unethical and two law breaking conducts (4 mks)“ (14 marks) QUESTION FOUR (14 marks) ~~ Briefly explain four (4) types of intellectual property protection (8 mks) b. Highlight three (@) ways our privacy is threatened by computer Technology (3 mks) ©. With an example each, mention two ways our privacy can be protected (3 mks) QUESTION FIVE (14 marks) a, Define the term Authentication (3 mks) b. Write a short note each on the following biometric authentication methods (6 mks): i. Fingerprint Recognition Facial Recognition iii. Hand Geometry . Write a short note on User Identification and Processed Object (5 mks) RUESTION SIX (14 marks) a, What do you understand by Internet filtering? (4 mks) b. Briefly describe any three (3) preferred method that can be used to limit/filter internet access (6 mks) ©. What do you understand by Computer Crime? (4 mks) BUT/COLNAS/CSC 208/EXAM_AUG 2021 SSUESTION SEVEN (14 marks) a Distinctively distinguish between copyright infringemen and Computer theft (5 mks) b. Highlight three (3) forms of Computer Attack (6 mks) c. State any type of Computer security and give one advantag: and one disadvantage of the chosen type. (3 mks)

You might also like