2021 Fy12cecomputer Studies Detailed Solution
2021 Fy12cecomputer Studies Detailed Solution
2021
COMPUTER STUDIES
MARKING SCHEME
16 Answer: Selection
Which of the following logical structures are
A selection structure is a programming
used in a program for decision making?
feature that performs different processes
A. Loop based on whether a boolean condition is
B. Sequence true or false. Selection
C. Iteration structures use relational operators to test
conditions. There are different types
D. Selection
of selection structures that can be used to
achieve different outcomes.
17 Which of the following data type is used to hold
single alphabet or number? Answer: Char
QUESTION 1 THE INTERNET AND THE WORLD WIDE WEB (10 marks)
PROPRIETY AND FREE AND OPEN SOURCE SOFTWARE
(ii) The signature is the additional information of the person sending the message.
(1 mark)
(b) A blog is a journal or newsletter that is updated frequently and intended for the general public.
Blogs reflect their author‘s philosophical reflections, thoughts, ideas and opinions whereas A
wiki is a type of website that allows users to add, modify and delete contents.
(c) The Internet of things (IoT) is the extension of Internet connectivity into physical devices and
everyday objects. Embedded with electronics, Internet connectivity, and other forms of hardware
(such as sensors), these devices can communicate and interact with others over the Internet,
and they can be remotely monitored and controlled.
(2 marks)
(e) Users are not familiar with these software since they are trained using proprietary software.
May work well individually but may clash with other components of a system.
No guarantee that development will continue.
Any one for 2 marks (2 marks)
7.
(a) Computer Ethics are guidelines for the morally acceptable use of computers in our society or
the standard behaviour regarding the use of computers for individuals and organizations.
(1 mark)
(b) Is it right for someone who buys a program to copy it for a friend?
Is it fair to tap into someone else‘s computer data files?
Should computer operators regard all data they process as completely confidential?
Does a company owe a worker who has been replaced by a computer or any consideration other
than that prescribed by labour law or contract?
Any 2 for 2 marks (2 marks)
(c) The internet has introduced a massive wave of changes to business, and in the way the world
does business. In fact, the internet made the global marketplace more accessible via
immediate connections and lines of communication.
Business users can access potential customers from the mobile devices they have on their
person nearly 24/7.
The ability to access information quickly and easily is a major benefit for businesses
The internet improves internal communications through email, connected calendars and chat
services specifically designed to improve business communications.
One of the biggest advantages created by the internet is the ability to access and market to
large audiences. Content marketing is essentially free, and businesses can create content that
their audience desires, as a means of driving qualified traffic to the business.
Any 1 for 2 marks (2 marks)
(d) A history file that includes the location of sites visited by your browser whereas cookies or
specialized programs are deposited on your hard disk from Web sites you have visited.
Any one for 2 marks (2 marks)
(e) Use of biometrics. Example: thumb print scan, retina scan, voice recognition.
Use of Password: pins, password to gain access
Physical security: authorized to selected people
Possess object: ID cardscanned, credit card
(3 marks)
(b) Bluetooth is a short range RF communication that can transmit data in any direction within ten
meters. (1 mark)
8.
(c) Assembling of a message or file into smaller packets that are transmitted over the Internet and
received by a TCP layer that reassembles the packets into the original message.
(2 marks)
(e) Connect multiple hosts: Normally, a switch provides a large number of ports for cable
connections, allowing for star topology routing. It is usually used to connect multiple PCs to the
network.
Forwards a message to a specific host: a switch uses the same forwarding or filtering logic on
each port.
Manage traffic: A switch in networking can manage traffic either coming into or exiting the
network and can connect devices like computers and access points with ease.
Keep electrical signal undistorted: When a switch forwards a frame, it regenerates an undistorted
square electrical signal.
Increase LAN bandwidth: A switch divides a LAN into multiple collision domains with
independent broadband, thus greatly increasing the bandwidth of the LAN.
Any 1 for 2 marks (2 marks)
(a) (i)
(1 mark)
(b) Intrusion detection systems (IDS) work with firewalls to inspect all incoming and outgoing
network traffic and identifies suspicious patterns that may indicate a network or system attack
from someone attempting to break into or compromise a system. Two way street.
(2 marks)
9.
(c) Metropolitan Area Network (MAN) is a network that extends far beyond the reach of a LAN. It
usually connects offices that are spread around a city or even across multiple cities within an
approximate distance of one hundred and fifty kilometers. (1 mark) MAN is typically owned
by a group of organizations who set/select the protocols and bandwidth in place for data
transmission to take place. MAN increases the efficiency of handling data and also increase the
speed of transferring data. It is also cost effective and enhances sharing of resources such as
printers. (1mark)
However it is difficult to manage the network once it becomes large. It requires more cables for
connection from one place to the other compare to LAN. (1 mark)
(1 mark)
(3 marks)
(d) Copyright, Digital Rights Management, software licensing Any 2 for 2 marks
(2 marks)
(a) A clean compile is when there are no errors found in the code during compiling process.
(1 mark)
(1 mark)
(ii) Variable is something that keeps on changing like hours whereas constant remains fixed
like rate which is 3.25. (2 marks)
(c)
130
(2 marks)
10.
(d)
Start
False True
If
BMI
> 25
True Overweight
False If
BMI
< 18
Healthy Underweight
Weight
Name, BMI,
Comment
End
(4 marks)
11.
(b) A Tier I data center represents an availability of 99.671% whereas Tier II data centers have an
availability of 99.749%.
Tier I data center can have up to 28.8 hours of interruption a year whereas Tier II data centers
have 22 hours of interruption per year. (Any 1 for 2 marks) (2 marks)
(c) Cloud Storage is networked storage, or disk space, available over a specific network - the
Internet. Cloud storage allows you to store resources such as computer files on remote
computers called servers. This remote infrastructure is installed and managed by highly
specialized companies or experts. (2 marks)
(2 marks)
(e) Most electronics contain non-biodegradable materials, and heavy metals and toxic materials
like cadmium, 50 lead and mercury. Over time, these toxic materials can leak into the ground,
where they can contaminate the water we drink, the plants we eat and the animals that live
around the area.
(2 marks)
10
12.
QUESTION: 1
Introduction
Facebook
Facebook is a website which allows users, who sign-up for free profiles, to connect with friends, work
colleagues or people they don’t know, online. It allows users to share pictures, music, videos, and
articles, as well as their own thoughts and opinions with however many people they like. Users send
“friend requests” to people who they may – or may not – know.
Twitter
Twitter, a social networking site launched in 2006, is one of the most popular social media platforms
available today, with 100 million daily active users and 500 million tweets sent daily. Twitter can be
used to receive news, follow high-profile celebrities, or stay in-touch with old high school friends.
Viber
Viber is a free to download app that allows users to make free calls, send texts, pictures and video messages to
other Viber users. It works on both mobile and computer and can be used to connect with people around the
world.
Whatsapp
WhatsApp is a free, multiplatform messaging app that lets you make video and voice calls, send text
messages, and more — all with just a Wi-Fi connection.
Social responsibilities
Respect others privacy
Do not add on fake news
Show respect to others when commenting
Conclusion
13.
QUESTION: 2
Introduction
Computer Criminals
The largest category of computer criminals consists of those with the easiest access to computer
namely the Employees. Sometimes the employee is simply trying to steal something from the
employer whether it is the equipment, software, electronic funds, proprietary information, or
computer time. Sometimes the employee may be acting out of resentment and is trying to get back
at the company.
Not only employees but also some suppliers or clients may have access to a company‘s computer
system known as Outside Users. For example, bank customers who use an automatic teller machine.
Like employees, these authorized users may obtain confidential passwords or find other ways of
committing computer crimes.
In most organisations, people who commit cyber-crime are classified as Hackers and Crackers. For
instance people think of these two groups as being the same, but they are not. Hackers are people
who gain unauthorized access to a computer system for the fun and challenge of it or are people who
create or improve programs and share those programs with fellow hackers. Typically, they are not
criminals. Crackers also gain unauthorized access to a computer system, create and share programs
designed to gain unauthorized access to computer systems or disrupt networks but their motives are
malicious and can be very destructive and costly. They are criminals.
Carders are criminals who specialize in stealing, trading, and using stolen credit cards over the
internet. Some carders use sophisticated electronic devices to copy data from your credit or debit
card including account numbers and PINs for example, key loggers.
Organized crime has discovered that computers can be used just like legitimate business people use
them, but for illegal purposes. For example, computers are useful for keeping track of stolen goods
or illegal gambling debts. In addition, counterfeiters and forgers use microcomputers and printer to
produce sophisticated-looking documents such as checks and driver‘s licenses and currency.
Terrorists: knowledgeable terrorist groups and hostile governments could potentially crash satellites
and wage economic warfare by disrupting navigation and communication systems.
Computer crimes
Child pornography - Making or distributing child pornography.
Copyright violation - Stealing or using anotherperson's Copyrightedmaterial without permission.
Cracking - Breaking or deciphering codes that are being used to protect data.
Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
Cyberbully or Cyberstalking - Harassing or stalking others
online.
Cybersquatting - Setting up a domain of another person or company with the sole intentions of
selling it to them later at a premium price.
Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.)
Denial of Service attack - Overloading a system with so many requests it cannot serve normal
requests.
Espionage - Spying on a person or business.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or
participating in credit card fraud.
Harvesting - Collect account or other account related information on other people.
Human trafficking - Participating in the illegal act of buying or selling other humans.
Identity theft - Pretending to be someone you are not.
14.
Illegal sales - Buying or selling illicit goods online including drugs, guns, and psychotropic
substances.
Intellectual property theft - Stealing practical or conceptual information developed by another
person or company.
IPR violation - An intellectual property rights violation is any infringement of another's
Copyright, patent, or trademark.
Phishing - Deceiving individuals to gain private or personal information about that person.
Salami slicing - Stealing tiny amounts of money from each transaction.
Scam - Tricking people into believing something that is not
true.
Slander - Posting libel or slander against another person or company.
Software piracy - Copying, distributing, or using software that is Copyrighted that you did not
purchase.
Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.
Spoofing - Deceiving a system into thinking you are someone you really are not.
Typosquatting - Setting up a domain that is a misspelling of another domain.
Unauthorized access - Gaining access to systems you have no permission to access.
Wiretapping - Connecting a device to a phone line to listen to conversations.
(Any four for 4 marks)
Encryption - Whenever information is sent over a network, there is always a possibility that this
information will be accessed without authorization. The longer the distance travelled, the higher the
security risk. One way to protect sensitive data and information is to encrypt it. Encryption is the
process of converting readable data into unreadable characters. To read the data, the recipient must
decrypt it, or decipher it into readable form.
Restricting Access - Using a username and password. A username, or user ID, is a unique
combination of characters, such as letters of the alphabet or numbers that identifies a specific user.
A password is a unique combination of characters, such as letters of the alphabet or numbers which
identifies and allows access to certain computer resources. Longer and mixed (alphabets plus
numbers) passwords provide greater security than shorter ones.
Biometric security devices and systems include fingerprint scanners, face recognition systems,
voice verification systems a n d iris r e c o g n i t i o n systems. A fingerprint scanner is a type of
electronic security system that uses fingerprints for biometric authentication to grant user access to
information or to approve transactions. Face recognition describes a biometric technology that
attempts to establish an individual's identity.
Conclusion
15.
QUESTION: 3
Introduction
½ mark
16.
QUESTION: 4
Introduction ½ mark
Public clouds are owned and operated by third-party service providers. When using the public
cloud, the services provided are offered to multiple clients who all share the same infrastructure.
Some of the most common real world examples of public cloud services include services like
cloud-based server hosting, storage services, webmail and online office applications. 1 mark
Advantages:
Infrastructure costs are spread across all users, thus allowing each individual client to
operate on a low-cost, ―pay-as-you-go‖ model.
They are typically larger in scale than an in-house enterprise cloud, which provides clients
with seamless, on-demand scalability.
Any 1 for 1 mark
17.
Disadvantages:
Security protections and availability variances, as these factors are wholly managed and
supported by the service provider. 1 mark
Private clouds are those that are built exclusively for an individual enterprise. They allow the firm
to host applications in the cloud. There are two variations of private clouds: On-Premise Private
Cloud and Externally-Hosted Private Cloud. 1 mark
Advantages:
Improved security
Greater control over the server
Flexibility in the form of Cloud Bursting Any 1 for 1 mark
Disadvantages
Complicated implementation
A private cloud can be difficult to implement securely. A specialist may need to be hired with
extensive knowledge of how these clouds can tie in with the business practices.
Hybrid clouds combine the advantages of both the public and private cloud models. In a hybrid
cloud, a company can leverage third-party cloud providers in either a full or partial manner. This
increases the flexibility of computing. The hybrid cloud environment is also capable of providing
on-demand, externally-provisioned scalability. 1 mark
Advantages
cost savings: Instead of having to spend the money and build infrastructure to withstand
occasional bursts in system usage that only happen a small fraction of the time,
organizations can leverage public cloud offerings to offload some of the heavy usage, and
only have to pay for it when they need it.
Improved Security is another major benefit of hybrid clouds.
enhanced organizational agility: By leveraging the public cloud in times of heavy usage,
the organization can experience fewer outages and less downtime.
Any 1 for 1 mark
Disadvantages
Communication in the network level may be conflicted as it is used both clouds.
Security may breach through the public cloud, if it is not use properly
Any 1 for 1 mark
Conclusion ½ mark
THE END
_______________________________
COPYRIGHT: MEHA, FIJI, 2021.