CSC134 Practice Exam With Answers PDF

Title CSC134 Practice Exam With Answers
Course Computer & Information Processing
Institution Universiti Teknologi MARA
Pages 16
File Size 515 KB
File Type PDF
Total Downloads 181
Total Views 333

Summary

Warning: TT: undefined function: 32UNIVERSITI TEKNOLOGI MARAFINAL ASSESSMENTCOURSE : COMPUTER AND INFORMATION PROCESSINGCOURSE CODE : CSCDATE : JULY 2020TIME : 4 HOURSSEMESTER : SEMESTER MARCH – JULY 2020INSTRUCTIONS TO CANDIDATES This question consists of THREE (3) parts : PART A (20 Questions) PAR...


Description

CONFIDENTIAL

UNIVERSITI TEKNOLOGI MARA FINAL ASSESSMENT

COURSE

:

COMPUTER AND INFORMATION PROCESSING

COURSE CODE

:

CSC134

DATE

:

JULY 2020

TIME

:

4 HOURS

SEMESTER

:

SEMESTER MARCH – JULY 2020

INSTRUCTIONS TO CANDIDATES 1.

This question consists of THREE (3) parts : PART A (20 Questions) PART B (5 Questions) PART C (2 Questions)

2.

Answer ALL questions from all three (3) parts

3.

Rename the document as Class_Name_StudID_FinalExam then submit it back to Google Classroom

: Aida Maisarah Binti Abd Rahman

Name Student ID

: 2018418622

Group

: AS1204K

Lecturer’s name

: Miss Siti Norsyuhada Binti Zainudin

Section

Total marks

Part A

20

Part B

50

Part C

30

Total marks

100

Marks

Lecturer’s Comment

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 11 printed pages

CONFIDENTIAL

CONFIDENTIAL PART A (20 MARKS) Highlight the correct answer.

1.

_____________ is a number that uniquely identifies each computer or device connected to the internet, while ____________ is a text version.

2.

3.

4.

5.

A.

IP address, domain name

B.

IP ID, network name

C.

Domain name, Network ID

D.

Network ID, network name

A network topology includes a bus network, star network, and _________ network. A.

circular

B.

host

C.

ring

D.

token

Choose the INCORRECT types of websites. A.

Informational

B.

Advocacy

C.

Games

D.

Portal

Identify the process that will enable a user to send a file to a dedicated server. A.

Sending

B.

Receiving

C.

Uploading

D.

Downloading

Find a term to represent an online diary or commentary. A.

Bitmap

B.

Blog

C.

HTML

D.

Vector

2 CONFIDENTIAL

CONFIDENTIAL 6.

Select the international community that oversees research and sets guidelines and standards for many areas of the internet.

7.

A.

The World Wide Web Corporation (W3C)

B.

The World Wide Web Consortium (W3C)

C.

The World Wide Web (WWW)

D.

The World Wide Web Global (WWWG)

Match the following network type with their description.

Type

Description

A.

LAN

1.

A wireless network that works within a very small area.

B.

MAN

2.

Countrywide and worldwide network that uses microwave relays and satellites to reach users over long distances.

C.

WAN

3.

A network consisting of computers and other devices that are physically near each other.

D.

PAN

4.

The network used to link between office buildings that are located in a city.

8.

A.

A → 1; B → 2; C → 3; D → 4

B.

A → 2; B → 3; C → 4; D → 1

C.

A → 3; B → 4; C → 2; D → 1

D.

A → 4; B → 1; C → 3; D → 2

Select the term used for a wireless LAN that provides internet access in public places such as hospitals, airports, and a cybercafe. A.

Hotspot

B.

Intranet

C.

WiMAX

D.

DSL

3 CONFIDENTIAL

CONFIDENTIAL 9.

Indicate a wireless communication standard that will support data transmission between a handheld device and a printer inside an office.

10.

A.

Bluetooth

B.

Microwave

C.

Cellular

D.

Router

The amount of data, instructions, or information that can travel over a communications channel is called ________. A. bandwidth B. broadband C. digital D. analog

11.

Choose the BEST statement that describes bandwidth. A.

Measurement of standard telephone communication

B.

A measurement of midrange computers and mainframes connection, and data transmission over long distances.

C.

A measurement of individual computers' connections that are located close to one another.

D. 12.

A measurement of the width or capacity of the communication channel.

Choose the INCORRECT example of wireless transmission media. A.

Microwaves

B.

Communication satellite

C.

Fiber optic

D.

Cellular radio

4 CONFIDENTIAL

CONFIDENTIAL 13.

14.

Choose the CORRECT protocol for the following features. ●

Developed by IEEE



Towers can over the 30-mile radius



Two types are fixed wireless and mobile wireless



Provides wireless broadband internet access

A.

WAP

B.

WiMAX

C.

WiFi

D.

TCP/IP

___________ is any illegal activity involving the use of a computer or related devices. A. Internet crime B. Digital crime C. Computer crime D. Cybercrime

15.

Which computer crime causes computer systems to slow down or stop? A. Data Manipulation B. Internet Scams C. Identity Theft D. Denial of Service Attack

16.

____________ is a program that hides in a computer and allows someone from a remote location to take full control of the computer or devices. A. Worm B. Rootkit C. Trojan Horse D. Adware

5 CONFIDENTIAL

CONFIDENTIAL 17.

Which of the following statement refers to Cookies? A. It includes locations or addresses of sites that have recently visited. B. Ensures the browsing activity is not recorded on a hard drive. C. Wide range of programs that are designed to secretly record and report Internet activities. D. Small data files that are deposited on the hard disk from web sites that have been visited.

18.

Give the process that converts readable data into an unreadable pattern to prevent unauthorized access. A. piracy B. back up C. biometric scanning D. encryption

19.

The information that people voluntarily post in social networking sites, blogs, and photo and video-sharing sites is used to create their ________. A. access approval B. firewall C. online identity D. phish

20.

Identify the definition of computer ethics. A. Computer ethics is an exclusive right to duplicate, publish, and sell materials. B. Computer ethics is the moral guidelines that govern the use of computers and information systems. C. Computer ethics is meant to reduce electricity and environmental waste while not using a computing device. D. Computer ethics is the right of individuals and companies to restrict the collection and use of information about them.

6 CONFIDENTIAL

CONFIDENTIAL PART B (50 MARKS)

QUESTION 1

a)

Education websites can provide the important information of the institutions and updated news related to the institution’s achievement and so forth. Explain TWO (2) criterias of a good website’s content. 

The website objectivity must be clear and it present information with minimum bias. It must not try to sway the audience with the information and the content must not conflict with site advertising and the website must not persuade as if trying to sell anything



The currency of the website which means how often the site is updated and maintained and how the current information is presented (2 marks)

b)

The following Figure 1 is a screenshot of a webpage that has a unique address called URL or web address. Based on the given URL, identify the components from 1 - 4.

Figure 1 

1 = protocol



2 = domain name



3=



4 = directory/file path

(2 marks) 7 CONFIDENTIAL

CONFIDENTIAL

b)

State the generic top-level domain of the URL above. 

edu



my



edu.my (1 mark)

d)

One of the fastest growing types of e-commerce is Business to Consumer (B2C). Explain TWO (2) advantages of buying products over the internet. Provide ONE (1) example of B2C. (5 marks)

QUESTION 2

Computer communications are the process of sharing data, programs, and information between two or more computers.

a)

List FOUR (4) basic elements of successful computer communication. 

Sending and receiving devices



Connection devices



Data transmission specification



Communication channel (4 marks)

b)

Numerous applications depend on computer communication systems including email, texting and video conferencing.

Illustrate the process of computer communications by stating the four (4) basic elements of successful communication.

8 CONFIDENTIAL

CONFIDENTIAL

(4 marks)

c)

Nowadays, we live in a truly connected society. Many potential business organizations have increased the connectivity and networking in order to increase their productivity.

Provide your opinion in supporting the statement above. (2 marks)

QUESTION 3

a)

A few internet providers have unlimited data plans, but the connection speed may slow down significantly if your usage is excessive. Some providers start charging overage fees if you exceed the monthly data limit.

In your opinion and experiences as internet users, explain THREE (3) suggestions on how to minimize data usage for your mobile device. 

Don’t enable the data usage for all apps -

There are many apps that we rarely use and if we didn’t turn it off the apps will download the data to the phone when its need to. In order to avoid this, we must go to the settings and block the data usage of the apps that we rarely use

9 CONFIDENTIAL

CONFIDENTIAL



Turn on the airplane mode when we didn’t use the phone -

By turning on this mode, it will put a stop to our data usage. It will block all data transfer from our phone and will set the data usage to 0%



Limit the data usage for apps -

After we already disabled the data usage for apps we rarely use, we must limit the data usage that we frequently use. Sometimes, when we already close the apps, there are some of still running in the background. By setting the limit data, we can make sure the app will never surpass certain threshold of data usage (6 marks)

b)

Global Positioning System (GPS) technology such as Waze and Google Maps have been famous among users regarding navigation systems which can be downloaded into mobile phones.

State TWO (2) benefits of using GPS in Malaysia. 

Neighbourhood search -

When we navigate around town in Malaysia that we unfamiliar with, we can use GPS as to provide on the local area such as the nearest restaurant, gas station or hotels. This is really convenient for people in the place they unfamiliar that need to find place to stop food, sleep, eat and others



Traffic alerts -

By using GPS we can be notified if there is any traffic accidents, jammed or police ahead the road. This will help us to shorten our journey time



Flexible route option -

GPS can give us route that we wanted to use and when we take a wrong turn, the GPS will give a new route. GPS also ca be used to calculate a new pathway when our route is blocked by any incident (4 marks)

10 CONFIDENTIAL

CONFIDENTIAL QUESTION 4

a. Define the following types of Malware. i. Worm - will make the computer fills with self-replicating information which lead to our laptop to load and lagging (1 mark) ii. Trojan Horse -

A software that looks legit but disguised as something else and this also can lead to zombie pc and the hacker will used our computer unknowingly to do some illegal things (1 mark)

b. There are several principle measures to ensure computer security. One of them is preventing data loss. Briefly explain TWO (2) actions that can be done to ensure that the preventing is taking place. 

We have to backup frequently and save it on cloud because its much safer such as google drive, one drive, google photos



Redundant data storage and we need to store off site in case of any loss equipment (4 marks)

c. Computer addiction can be described as the excessive or compulsive use of the computer, which persists despite serious negative consequences for personal, social, or occupational function. Briefly explain TWO (2) symptoms of computer addictions. 

Craves the computer time because addicted to computer and enjoyed more when spending time with computer than real life



Neglects family and friend because they think computer is more important than family and friends and they tend to socialize more in virtual life more than real life (4 marks)

11 CONFIDENTIAL

CONFIDENTIAL QUESTION 5

a) Interpret the following terms. i.

Malicious program. A malware created by cracker which is a computer criminal in order to damage the computer system (2 marks)

ii.

Denial of Service (DoS) attack. One of cybercrime which will attempt to slow down or stop our computer system by flooding it with request for infromation (2 marks)

b) Explain THREE (3) measures to protect computer security. 

Restricting access will limit access to people that have authority to do so such as using password manager and firewall and security suites



Encrypting data will make the files unreadable except those who have the encryption key such as virtual private network (VPN), website encryption that use https



Anticipating disaster which means that prepare for any disaster by ensuring physical security and data through disaster recovery plan. This will protect from any unauthorized tampering or damage (6 marks)

12 CONFIDENTIAL

CONFIDENTIAL PART C (30 MARKS)

QUESTION 1 Mobile capabilities have grown rapidly with the production of smartphones, tablets, and wireless connection to the internet. Mobile applications are sometimes referred to as mobile applications (mobile apps).

a)

Identify and describe the FIVE (5) example of widely used mobile apps. 

Lifestyle mobile apps are apps that support individual facet that define our lifestyle such as fitness, music, travel Example : Spotify, Airbnb



Social media mobile apps are apps that connect us with other people despite the location Example : Facebook, Instagram, Whatsapp



Games/Entertainment mobile apps are apps that we can play or watch what we love Example : Netflix, Subway Surfer, PUBG, Youtube



Productivity mobile apps will help us accomplish a task quicky and effieciently Example : WPS, Evernote, Scanner, Touch n Go e Wallet



Utility mobile apps are apps that we frequently use as it were pre-installed in our device Example : Weather, Calculator, Flashlight and Reminders (10 marks)

b)

“Mobile devices and apps can benefit the environment by reducing the production of paper.” Support the above statement with an explanation of the usage of TWO (2) relevant mobile apps. 

The Star Malaysia mobile apps is a Malaysian news apps. We can reas the news online without have to buy the newspaper



DocuSign apps is convenience for students and office worker. Its an app where we can scan our document by using phone and the app have a feature where we can sign in the document without being printed out.



Both of this apps can help us reduce the usage of paper and can save the environment more.

13 CONFIDENTIAL

CONFIDENTIAL (4 marks)

b)

List ONE (1) of the sources for users to download mobile apps on smartphones. Google Playstore (1 mark)

14 CONFIDENTIAL

CONFIDENTIAL QUESTION 2

The network is a communication system that connects two or more computers so that the information and resources can be exchanged and shared.

a) Suggest THREE (3) advantages of the communication system used in Online Distance Learning (ODL).



Convenience of studying wherever we are such as in the room, in mall as long there is internet connection



Flexibility to combine it with other study and house chores so we can do multitasking and save more time



Lower cost because we don’t have to pay for college fees, the book supplies as it were supplied by lecturers



Studying online requires more self-dicipline and responsibility abd time management skills. This will help to enhance these skill (6 marks)

b) The physical arrangement or layout of the network is called network topology. There are several network topologies that can be implemented. Choose ONE (1) network topology that is suitable to be implemented in an office AND briefly explain ONE (1) advantage and ONE (1) disadvantage of the chosen topology. 

A star topology is suitable for office because every node is connected to one central switch



The advantage of this star topology is can manage the entire network from one location which is the central switch. If the node is not central, the node will go down and the network will remain up and we can add new computer without having to take the network offline



The disadvantage is when the central switch goes down then entire network will go down and the administrator need to manage the health of the centre node to make sure it isn’t go down (4 marks)

15 CONFIDENTIAL

CONFIDENTIAL c) Nowadays, many users have the option to set up their own network at home. A home network comprises of devices such as a computer, game console, printer, and mobile device, and all devices are connected to the internet and each other. The connection can be a combination of wired and wireless connectivity. Design an example of the home network layout by using a labelled diagram.

(5 marks)

END OF FINAL ASSESSMENT
...


Similar Free PDFs