Introduction to ICT: BBS 140 Final Exam

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

How is a computer on the internet uniquely identified?

  • E-mail address
  • MAC address
  • IP address (correct)
  • Street address

For what primary purpose is HTML used?

  • Managing web servers
  • Developing high-level programs
  • Creating machine language programs
  • Designing web pages (correct)

Which HTML tag is used to denote the start of a new paragraph?

  • `<td>`
  • `<p>` (correct)
  • `<tr>`
  • `<br>`

What does WWW stand for in the context of web addresses?

<p>World Wide Web (C)</p> Signup and view all the answers

Which layer in the OSI model provides the interface between the system and the user?

<p>Application (A)</p> Signup and view all the answers

Requiring users to change passwords frequently enhances which aspect of network security?

<p>Security (C)</p> Signup and view all the answers

A computer system that is inaccessible violates which security principle?

<p>Availability (A)</p> Signup and view all the answers

What term is commonly used to describe unsolicited commercial email?

<p>Spam (B)</p> Signup and view all the answers

What is the right to use a piece of software often referred to as?

<p>License (C)</p> Signup and view all the answers

Which of the following is a primary function of a firewall?

<p>Controlling incoming and outgoing data traffic (B)</p> Signup and view all the answers

What are IP and MAC addresses, and how do they differ in identifying devices on a network?

<p>IP address is logical address for identifying devices on a network, MAC address is physical address.</p> Signup and view all the answers

The acronym HTML stands for ______ Markup Language.

<p>HyperText</p> Signup and view all the answers

The secure version of HTTP is known as ______.

<p>HTTPS</p> Signup and view all the answers

What is FTP and what is its primary function?

<p>FTP (File Transfer Protocol) is used for transferring files between a client and a server on a network.</p> Signup and view all the answers

What does the acronym ISP stand for, and what service does an ISP provide?

<p>ISP stands for Internet Service Provider, which provides internet access to users.</p> Signup and view all the answers

What is the main function of a web browser? Give two examples of web browser.

<p>A web browser is used for displaying and interacting with web pages. Examples: Chrome, Firefox.</p> Signup and view all the answers

Static web pages change dynamically based on user interactions and server-side processing.

<p>False (B)</p> Signup and view all the answers

Describe the main purpose and four fundamental parts of a URL (Uniform Resource Locator).

<p>A URL (Uniform Resource Locator) is a unique address for every webpage. It contains the protocol, domain name, path, and query string.</p> Signup and view all the answers

Match the following internet domain extensions with the types of institutions or entities that typically use them:

<p>.biz = Businesses or commercial purposes .gov = Government entities .org = Nonprofit organization .com = Commercial entities</p> Signup and view all the answers

Briefly describe the term Protocol with regards to internet technologies.

<p>Protocol is a standard set of rules that allows electronic devices to communicate with each other.</p> Signup and view all the answers

Flashcards

What is a URL?

A unique web address for every webpage, consisting of parts that define the protocol, domain, and path to a specific resource on the web.

What is a Protocol?

A set of rules governing communication between devices on a network, ensuring data is correctly transmitted and received.

What is POP3?

A mail retrieval protocol that allows you to download e-mail messages on your local computer and read them even when you are offline.

What is IMAP?

An email protocol that allows you to access email stored on a mail server. It allows multiple clients to access the same mailbox.

Signup and view all the flashcards

What is SMTP?

An email protocol used for sending email over the Internet.

Signup and view all the flashcards

What are network topologies?

The arrangement of a network, which includes devices, computers, and conections.

Signup and view all the flashcards

What is Intranet?

Is a private network accessible only to an organization's staff. It is used to share information and resources within the organization.

Signup and view all the flashcards

What is Extranet?

Is a network that allows limited access to an organization's intranet for external users, providing access to specified resources.

Signup and view all the flashcards

What is a Internetwork processor?

A type of network device used to interconnect different telecommunications networks.

Signup and view all the flashcards

What is the ISO-OSI model?

A conceptual framework that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.

Signup and view all the flashcards

What is authentication?

The process of verifying the identify of a user. It helps to prevent unauthorized acceess and use of systems.

Signup and view all the flashcards

What is Information System Ethics?

A set of moral principles that govern the behavior of individuals and organizations in the use of information systems.

Signup and view all the flashcards

What is Netiquette?

Are the dos and don'ts of online interaction that promotes respectful and effective online communication.

Signup and view all the flashcards

What is Computer Security?

Refers to the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Signup and view all the flashcards

Study Notes

  • The final examination for Introduction to ICT: BBS 140 is a deferred ODL exam from January 2021.
  • The exam duration is three hours and is worth 100 marks.
  • The examination paper contains three sections.
  • Sections A and B are compulsory with section C requiring four questions to be answered.
  • No reference materials are allowed during the examination.

Section A: Mutliple Choice

  • Section A is compulsory and worth 10 marks.
  • A computer on the internet is identified by its IP address.
  • HTML is used to create web pages.
  • The correct tag to mark the beginning of a paragraph in HTML is

    .

  • The full form of WWW in a web address is World Wide Web.
  • The Application layer of the OSI model determines the interface of the system with the user.
  • Requiring users to change passwords monthly improves the security of the network.
  • If a computer system is not accessible, the principle of Availability is violated.
  • Unsolicited commercial email is known as Spam.
  • The right to use a piece of software is termed a License.
  • A function of a Firewall is to monitor and enable control of incoming and/or outgoing data traffic.

Section B: Short Answers

  • Section B requires short answers.
  • You must define IP and MAC addresses.
  • Acronyms:
    • HTML
    • HTTPS
    • FTP
    • ISP
  • A web browser is used for browsing the web and examples include Chrome and Edge.
  • You must differentiate between static and dynamic web pages.

Section C: Essay Questions

  • Section C requires that only four questions are answered.

Question One

  • Every webpage has a URL, explain its four-part addressing scheme.
  • Determine what kind of institution would use these domains:
    • .biz
    • .gov
    • .org
    • .com
  • Briefly describe a Protocol.
  • Three Internet mail protocols need to be identified and described.
  • 3 Internet based services need to be discussed.

Question Two

  • Describe three different types of network topologies, giving advantages and disadvantages for each.
  • Discuss the difference between Intranet and Extranet.
  • List three internetwork processors that aid in the interconnection of telecommunications networks.
  • Briefly describe an ISO-OSI model, mentioning two of its layers.

Question Three

  • Describe four authentication methods used to secure Systems.
  • Define Information Systems ethics.
  • Give three reasons why ethics are important in computing.
  • Describe Netiquette, mentioning three email netiquettes.
  • Mention at least three commandments from the Ten Commandments in computer ethics.
  • Discuss the difference between Ethics and Law.

Question Four

  • Suggest how the Company ICT Systems are prevented from various security attacks if you are hired as a Security Specialist.
  • Briefly discuss the CIA triad of security requirements.
  • Explain the difference between:
    • White hat hackers and black hat hackers
    • Information protection and information assurance
    • Virus and worm
    • IDS and IPS
    • Phishing attacks and spoofing attacks

Question Five

  • How are Universities and Institutions responsible for teacher training dealing with the development of media and digital competences of their teachers and the training of future teachers.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

BBS
1 questions

BBS

TerrificVuvuzela1067 avatar
TerrificVuvuzela1067
Use Quizgecko on...
Browser
Browser