Podcast
Questions and Answers
How is a computer on the internet uniquely identified?
How is a computer on the internet uniquely identified?
- E-mail address
- MAC address
- IP address (correct)
- Street address
For what primary purpose is HTML used?
For what primary purpose is HTML used?
- Managing web servers
- Developing high-level programs
- Creating machine language programs
- Designing web pages (correct)
Which HTML tag is used to denote the start of a new paragraph?
Which HTML tag is used to denote the start of a new paragraph?
- `<td>`
- `<p>` (correct)
- `<tr>`
- `<br>`
What does WWW stand for in the context of web addresses?
What does WWW stand for in the context of web addresses?
Which layer in the OSI model provides the interface between the system and the user?
Which layer in the OSI model provides the interface between the system and the user?
Requiring users to change passwords frequently enhances which aspect of network security?
Requiring users to change passwords frequently enhances which aspect of network security?
A computer system that is inaccessible violates which security principle?
A computer system that is inaccessible violates which security principle?
What term is commonly used to describe unsolicited commercial email?
What term is commonly used to describe unsolicited commercial email?
What is the right to use a piece of software often referred to as?
What is the right to use a piece of software often referred to as?
Which of the following is a primary function of a firewall?
Which of the following is a primary function of a firewall?
What are IP and MAC addresses, and how do they differ in identifying devices on a network?
What are IP and MAC addresses, and how do they differ in identifying devices on a network?
The acronym HTML stands for ______ Markup Language.
The acronym HTML stands for ______ Markup Language.
The secure version of HTTP is known as ______.
The secure version of HTTP is known as ______.
What is FTP and what is its primary function?
What is FTP and what is its primary function?
What does the acronym ISP stand for, and what service does an ISP provide?
What does the acronym ISP stand for, and what service does an ISP provide?
What is the main function of a web browser? Give two examples of web browser.
What is the main function of a web browser? Give two examples of web browser.
Static web pages change dynamically based on user interactions and server-side processing.
Static web pages change dynamically based on user interactions and server-side processing.
Describe the main purpose and four fundamental parts of a URL (Uniform Resource Locator).
Describe the main purpose and four fundamental parts of a URL (Uniform Resource Locator).
Match the following internet domain extensions with the types of institutions or entities that typically use them:
Match the following internet domain extensions with the types of institutions or entities that typically use them:
Briefly describe the term Protocol with regards to internet technologies.
Briefly describe the term Protocol with regards to internet technologies.
Flashcards
What is a URL?
What is a URL?
A unique web address for every webpage, consisting of parts that define the protocol, domain, and path to a specific resource on the web.
What is a Protocol?
What is a Protocol?
A set of rules governing communication between devices on a network, ensuring data is correctly transmitted and received.
What is POP3?
What is POP3?
A mail retrieval protocol that allows you to download e-mail messages on your local computer and read them even when you are offline.
What is IMAP?
What is IMAP?
Signup and view all the flashcards
What is SMTP?
What is SMTP?
Signup and view all the flashcards
What are network topologies?
What are network topologies?
Signup and view all the flashcards
What is Intranet?
What is Intranet?
Signup and view all the flashcards
What is Extranet?
What is Extranet?
Signup and view all the flashcards
What is a Internetwork processor?
What is a Internetwork processor?
Signup and view all the flashcards
What is the ISO-OSI model?
What is the ISO-OSI model?
Signup and view all the flashcards
What is authentication?
What is authentication?
Signup and view all the flashcards
What is Information System Ethics?
What is Information System Ethics?
Signup and view all the flashcards
What is Netiquette?
What is Netiquette?
Signup and view all the flashcards
What is Computer Security?
What is Computer Security?
Signup and view all the flashcards
Study Notes
- The final examination for Introduction to ICT: BBS 140 is a deferred ODL exam from January 2021.
- The exam duration is three hours and is worth 100 marks.
- The examination paper contains three sections.
- Sections A and B are compulsory with section C requiring four questions to be answered.
- No reference materials are allowed during the examination.
Section A: Mutliple Choice
- Section A is compulsory and worth 10 marks.
- A computer on the internet is identified by its IP address.
- HTML is used to create web pages.
- The correct tag to mark the beginning of a paragraph in HTML is
.
- The full form of WWW in a web address is World Wide Web.
- The Application layer of the OSI model determines the interface of the system with the user.
- Requiring users to change passwords monthly improves the security of the network.
- If a computer system is not accessible, the principle of Availability is violated.
- Unsolicited commercial email is known as Spam.
- The right to use a piece of software is termed a License.
- A function of a Firewall is to monitor and enable control of incoming and/or outgoing data traffic.
Section B: Short Answers
- Section B requires short answers.
- You must define IP and MAC addresses.
- Acronyms:
- HTML
- HTTPS
- FTP
- ISP
- A web browser is used for browsing the web and examples include Chrome and Edge.
- You must differentiate between static and dynamic web pages.
Section C: Essay Questions
- Section C requires that only four questions are answered.
Question One
- Every webpage has a URL, explain its four-part addressing scheme.
- Determine what kind of institution would use these domains:
- .biz
- .gov
- .org
- .com
- Briefly describe a Protocol.
- Three Internet mail protocols need to be identified and described.
- 3 Internet based services need to be discussed.
Question Two
- Describe three different types of network topologies, giving advantages and disadvantages for each.
- Discuss the difference between Intranet and Extranet.
- List three internetwork processors that aid in the interconnection of telecommunications networks.
- Briefly describe an ISO-OSI model, mentioning two of its layers.
Question Three
- Describe four authentication methods used to secure Systems.
- Define Information Systems ethics.
- Give three reasons why ethics are important in computing.
- Describe Netiquette, mentioning three email netiquettes.
- Mention at least three commandments from the Ten Commandments in computer ethics.
- Discuss the difference between Ethics and Law.
Question Four
- Suggest how the Company ICT Systems are prevented from various security attacks if you are hired as a Security Specialist.
- Briefly discuss the CIA triad of security requirements.
- Explain the difference between:
- White hat hackers and black hat hackers
- Information protection and information assurance
- Virus and worm
- IDS and IPS
- Phishing attacks and spoofing attacks
Question Five
- How are Universities and Institutions responsible for teacher training dealing with the development of media and digital competences of their teachers and the training of future teachers.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.