0 ratings0% found this document useful (0 votes) 75 views10 pagesCSC208 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
BELLSUNIVERSITY OF TECHNOLOGY
OTA, OGUN STATE, NIGERIA
COLLEGE OF NATURAL AND APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE AND
INFORMATION TECHNOLOGY
Course Code: CSC 208-IT and Society
@ Unit)
2018/2019SECOND SEMESTER EXAMINATION
e Answer ALL Questions in SECTION A
e Answer ANY TWO (2)Questions in SECTION B
© Section A carries 25 marks while cach Question in
section B carries 22.5 marks each.
e Clear schematic illustrations, where required/necessary,
also carries marks.
TIME ALLOWED: 2 Hours
meatsSECTION A
i improved and evolved to facilitate our daily
1, Communication hes imp:
x Activites b. Communication c. Interactions d. Technologies e,
a .
Movements
2. The inventions of cellular phones,
devices are important in enhancing
a. Transportation. b. Communication c. I
Education
3, ICTs the technology required for ...
mrocessing, .
5 Data b. File c. Test d. Text e. Information
4 eee _ refers to the knowledge obtained from reading,
investigation, study or research.
a. Knowledge b. Information c. Data d. Raw facts e. Ideas
television and other electronic
ideas d. Discoveries e.
5. The following are tools for transmitting information
except, 2
a. Keyboard b. Phones c. Television d. Radios e. Tablets
6. Communication is an act of transmitting ..
a. Information b. Signals c. Messages d. Ideas e. Motives
ion includes the following
7. Some old means of communi:
except?
a. Signs b. Pigeon c. Poetry d. Smoke e. Letter-writing
8. The Sumerians was developed in ...
a. 3500 b. 3500 AD c. 3500 BD d. 3500 BC e. 3500 AC
was developed.
Phoenicians d. Vacuum tubes ¢.
9. In 1500 BC, the
a. Abacus b. Sumerians
Egyptian bones
‘BUTICOLNASICSC 208/EXAM Jun 2019
10. The Tsai Lun of China inves
a. 1500 BC b. 15OBC e. 1500 aD ad Tega eos Be
11. The First Printing Machine w,
a. 1454 b. 15446. S414. 14550 1ah ne
12. The Telegraph line was invented i
a. 1979 b. 1993 6.1793. 17926 1795
13. When was the first Television made public?
a, 1922 b. 1924 c. 1925 d. 1927 ¢. 1921
14 When was the first Telephone made public?
a. 1876 b. 1870 c. 1825 d. 1827 e. 1821
15. The Computer was created in ...
a. 1922 b. 1944 c. 1940 dj 1941 ©. 1921
16. ... Was introduced in 1958.
a. Typewriter b. Scanner c. Mobile phones d. Vacuum tubes e.
Photocopier
Pick the correct Year | Choose from the list
‘Ja | Machine
or Founder or Location | below
17_| Chinese Abacus 1963,
18 | Egypt Abacus Harvard University
19 | Napier’s Bones X 1620
Gottfried Wilhelm
20 | Pascaline
Charles Babbage
21_| Leibniz’s Rechner
22_| Weaving Loom 1653
23 | Mechanical Caleulator Joseph Marie
24_| Mark T 300 BC
25_ | Commumication Satellite 1569
26 | Arpanet Ke00Bc
Pgraters used the following
First-generation comp
aang emu cubes, punched card and ..
tt sic discs b. magnetic storage ¢. magnetic tapes d. mages
c
a, magne!
tubes e. silicon tapes
og, what was the technology used 10 transfer signals in the secon.
ration computers? : ;
4. Resistor b. transistors ¢- Circuits d. capacitors e. Arduino boards
49, John Bardeen, William Shockley and
Jargon scientists ofthe second-generation computer,
sarValter Houser b. Walter Brattain c. Houser Brattain d, Walter
Houser Brattain e. Walter
50, Smal silicon chips was a major component in which generation
of computer? yo a OES ty the
a. 1 generation b. 2™ generation ¢. 3°° generation d. #
generation,
e. 5” generation fachwny
[Sav [COMPUTERS WHAT PICK FROM THIS
Gexeration —_| Hist
Fi_| 1BM370 SERIES. __) GENERATION
37] SUPER COMPUTERS
28° GENERATION
= [at
31 | MANRANE
COMPUTERS, 3*° GENERATION
Pusat
36] MIs COMOTTERS
4™ GENERATION
3 RoR
Se] MART
33 [ TRANSISTOR
COMPUTERS "GENERATION
TAPE
at WACUORTTORES
42 [PERSONAL 6™ GENERATION
courts
[BELL
[s¢Tepc 700)
—
46, An example of patent for inventions
ty b. Games c.
a Uilty b. Games e. Names d. Logos. writings
447. Am example of Trademarks for brand identi
following except identity includes the
a. words b. Names c. Symbols d, Images e. Designs
48, Which of the three (3) is under Design for
h product appearance?
a. music, film & Sound b. Literary, names &design ines 8
. h ©. pl
: lant, tines &
d. texture, colours & utility e, word, names & multimedia
49, Privacy in IT refers to?
a. personal data b. Multimedia. Files d. data & Information e.tus
data
50. Information privacy is described as the Tight to .........and
+ Aecoss & keep b. store & restrict c. Deny & Restrict d. Lock &
Unlocke. Encrypt & Decrypti
SECTION B
Question One
a. What do you understand by Privacy in Computer usage?
(2.5 mks)
b. Explain THREE (3) means by which technology has
negatively affected the privacy of data. (10 mks)
c. Write a short note on Technology stating the two distinct
functions with respect to communication. (10 mks)
Question Two
a. How has ICT helped the society in the area of education
with reference to the following people:
i. Teachers ii. Student iii. Researchers iv. School
Administrators (12 mks)
b. Explain the following:
i. Data creation ii. Data preparation iii. Data transmission
(10.5 mks)
Question Three
a. What sole is ICT playing in the daily task of the following:
i. E-commerce stake holders ii. Suppliers iii. Employees
iv. E-commerce customers (12.5 mks)
b. Discuss five impact of ICT on the society (10 mks)
Question Four a
a. -i. What is the impact of ICT in the society when banking is
concerned? (4.5 mks)
\ oO ro ii. Tailor your discussion on the following people: Bank
ry Customers, Businessmen and Bank Administrator (9 mks)
Pr gh
ye & b. With the aid of two examples each, explain three data
processing methods.(9 mks)
———
BUT/COLNAS/CSC 208/EXAM June 2019BELLSUNIVERSITY OF TECHNOLOGY
OTA, OGUN STATE, NIGERIA
ae OF NATURAL AND APPLIED SCIENCES
PARTMENT OF COMPUTER SCIENCE AND
INFORMATION TECHNOLOGY
Course Code: CSC 208 - IT and Society
Unit)
2021/2022 SECND SEMESTER EXAMINATION
Read the following instructions carefully
e Answer any Five Questions
All Questions carries equal mark.
e Every other question carries 14 marks each
TIME ALLOWED: —2!?Hours
Fa
paiiectececee ee_—
Question One ,
_ Technology is vital in communien;
* communication and spreads ne be
these two 2) futons ae achjernsten Be ads
ICT has impacted every area of oe (Sm how
brought about changes. Briefly gre ty yy,
hs een impacted (S mks) sow ih
List and explain Three (3) impact tchen
Society(4 mks) FICT ong
Question Two
«Write short note on the social
. 5 proble:
sing a suitable example. (4.5 mks) 4 CT BS causes
ji, Computer ethics are moral guidelines as
tse of computer and computer network. Geonee™ the
justifications for the need of computer ethics = @)
iii, With two (2) examples each, highlight tet mig)
types of Intellectual property protection, (S miay™
Question Three quitter’
Our privacy in this age is constantly under thea fro
‘various places. Discus three popular ways your privacy
is threatened. (4.5 mks)_ a
‘One of the ways to secure our privacy is to ensure that
authentication is enforced. Briefly discuss the concept of
authentication. (4.5 mks) V#\'S Wengetg eters
How does the Biometric means of authebiication {iter
fiom the call-back system of authentication? (5 mks)
Question Four
i. Using the ATM as an example how is the process of
identification and verification achieved? (5 mks)
ii, fyouare the administrator of the website to a primary
school where Internet is used, what concept will you
_
BUTICOLNASICSC 20972 EXAM 2022
students do not have access to
‘the intemet? (mks)
, keyword blocking or site
response. (4:mks)
adopt to ensure the
immoral content on
ji, What will you propos
blocking? Justify your
Question Five (oe
x efimes? (4.5 mks) esor W
Highlight the following into the different categories o
Computer crimes: Hacking, Impersonation,
Conuthorised acess to personal compute. (4.5 mks)
iii, Which ofthe categories in five (i) do you consider as
causing the worst damage? (5 mks)
i. What are computer
Question Six
Computer security has become a necessity in the present
time. Explain Computer Security. (5 mks)
List and explain three (3) type of Computer Security.
65 mks)
‘Asa Computer Administrator in a school where
Students bring their laptop to school every time it is
needed, What type of computer security measuirg will
you recommend the school management to adopt and
why? (.5 mks) e
i,
ii
iii,
~~ Question Seven
Explain the term Computer threats? (2.5 mks)
Itemize five (5) type of malicious codes that serves as
threat to the computer system . Briefly describe two(7.5
mks)
State two (2) differences each between worm and Virus.
(4: mks) \y
vantSECTION B
Question One
a. What do you understand by Privacy in Computer usage?
(2.5 mks)
b. Explain THREE (3) means by which technology has
negatively affected the privacy of data. (10 mks)
c. Write a short note on Technology stating the two distinct
functions with respect to communication. (10 mks)
juestion Two
a. How has ICT helped the society in the area of ‘education
with reference to the following people:
i. Teachers ii. Student iii, Researchers iv. School
Administrators (12 mks)
b. Explain the following:
i. Data creation ii. Data preparation iii. Data transmission
(10.5 mks)
Question Three
a. What pole is ICT playing in the daily task of the following:
i. E-commerce stake holders ii, Suppliers iii. Employees
iv. E-commerce customers (12.5 mks)
b. Discuss five impact of ICT on the society (10 mks)
Question Four
a. -i. What is the impact of ICT in the society when banking is
S concerned? (4.5 mks)
7 eo ii. Tailor your discussion on the following people: Bank
¥ Ss Customers, Businessmen and Bank Administrator (9 mks)
re
b. With the aid of two examples each, explain three data
processing methods.(9 mks)
BUT/COLNAS/CSC 208/EXAM_June 2019BELLS UNIVERSITY OF TECHNOLOGY
OTA,.OGUN STATE, NIGERIA
COLLEGE OF NATURAL AND APPLIED SCIENCES
DEPARTMENT, OF COMPUTER SCIENCE AND
INFORMATION TECHNOLOGY
Course Code: CSC 208 — IT and Society
G Units)
2020/2021 SECOND SEMESTER EXAMINATION
Read the following instructions carefully
¢ Answer any FIVE questions
© Use Schematic diagram/figure/table where necessary
TIME ALLOWED: 2! Hours
© 208/EXAM_AUG 2021QUESTION ONE
The impact of Information and Communication Technology
GCT) has hed a tremendous effect on our lives. Briefly
explain ICT as it relates to our lives? (5 mks)
b. What is Technology as it relates to ICT and Society? (4
mks)
©. State two (2) ways technology is vital in communication and
gives an example in each case. (5 mks)
(14 marks)
QUESTION TWO (14 marks) .
a. In each sector of the society listed below, give two
advantages and . two disadvantages of ICT/Technology
application in that sector: (6 mks)
i, Education
ii Medicine
if, Crime
b. Itemize five (5) impacts of ICT on the society (5 mks)
© Discuss how Technology has brought about a paperless
————environment,-(3-mkes)
ASUESTION THREE
a. What do you understand by Computer/professional Ethics
and how is it different from law? (5 mks) +
b. How does Ethic and Law help to achieve Privacy? (S mks)*
©. State two unethical and two law breaking conducts (4 mks)“
(14 marks)
QUESTION FOUR (14 marks)
~~ Briefly explain four (4) types of intellectual property
protection (8 mks)
b. Highlight three (@) ways our privacy is threatened by
computer Technology (3 mks)
©. With an example each, mention two ways our privacy can
be protected (3 mks)
QUESTION FIVE (14 marks)
a, Define the term Authentication (3 mks)
b. Write a short note each on the following biometric
authentication methods (6 mks):
i. Fingerprint Recognition
Facial Recognition
iii. Hand Geometry
. Write a short note on User Identification and Processed
Object (5 mks)
RUESTION SIX (14 marks)
a, What do you understand by Internet filtering? (4 mks)
b. Briefly describe any three (3) preferred method that can be
used to limit/filter internet access (6 mks)
©. What do you understand by Computer Crime? (4 mks)
BUT/COLNAS/CSC 208/EXAM_AUG 2021SSUESTION SEVEN (14 marks)
a Distinctively distinguish between copyright infringemen
and Computer theft (5 mks)
b. Highlight three (3) forms of Computer Attack (6 mks)
c. State any type of Computer security and give one advantag:
and one disadvantage of the chosen type. (3 mks)