Inspire International Academy G12 Final Exam S1 2024-2025 PDF
Document Details
Uploaded by SaintlyDiscernment3889
Inspire International Academy
2025
Tags
Summary
This is a first semester final exam for 12A/B ICT students at Inspire International Academy. It covers topics relating to computer storage and networking systems.
Full Transcript
Inspire International Academy Academic Year : 2024- 2025 The First Semester Final Exam – SET [A] Duration: 2 hours Subject ICT Total Score Grade...
Inspire International Academy Academic Year : 2024- 2025 The First Semester Final Exam – SET [A] Duration: 2 hours Subject ICT Total Score Grade 12A/B 40 Date Obtained Score Student’s Name QUESTION NUMBER MAXIMUM MARK OBTAINED MARK SAFE AREA Q.1 6 3 Q.2 4 2 Q.3 9 4.5 Q.4 9 4.5 Q.5 12 6 BONUS QUESTION 1 TOTAL 40 20 First Checker’s Name Mrs. Sabrine khemiri Signature Cross Checker’s Name Signature Auditor’s Name Signature Instructions: *Read the questions carefully and attempt all. *Read your Exam Paper thoroughly before submission. *Use blue pen ONLY. Page 1 | 6 Inspire International Academy QUESTION 1: [2 points ×3 Questions = 6 points] Most large organizations have established a strategy called 6 an enterprise storage system to promote efficient and safe use of data. (1) Define mass storage. ______________________________________________________________________ ______________________________________________________________________ (2) Give the four mass storage devices that support this strategy. 1._____________________________________________________________________ 2._____________________________________________________________________ 3._____________________________________________________________________ 4._____________________________________________________________________ (3) (a) Which mass storage device is widely used for home and small business storage. ______________________________________________________________________ ______________________________________________________________________ (b) Give one advantage of this mass storage device. _______________________________________________________________________ ______________________________________________________________________ QUESTION 2: [1 point ×4 Questions = 4 points] Match the name of the technique used to improve the 4 performance of hard disks to the correct description. Disk caching - Hybrid drive - File compression - RAID Technique Description Reduce file size Use both SSD and hard disks Linked inexpensive hard disk drives Uses cache to anticipates data needs Please, go on to the next page….. Page 2 | 6 Inspire International Academy QUESTION 3: [1 point ×9 Questions = 9 points] Write true or false in the following: 9 (1) Any device connected to a network is called node. ( ) (2) Protocols are set of communication rules for exchanging data. ( ) (3) TCP/IP protocol converts text-based addresses to and from numeric IP addresses. ( ) (4) Bandwidth measures a communication channel’s width or capacity. ( ) (5) Router is a node that forwards data packets from one network to another network. ( ) (6) Wi-Fi is a wide area network (WAN). ( ) (7) In Mech network, each device is connected directly to a central network Switch. ( ) (8) In peer-to-peer network, the nodes have equal authority and act as both clients and servers. ( ) (9) The firewall creates secure private connection between remote users and the organization’s internal network. ( ) QUESTION 4: [1 point ×9 Questions = 9 points] Fill in the blanks using the following words 9 Encryption - Access - Cyberbullying - Accuracy - piracy Trojan horse - property - information brokers - Digital Right Management (1) ______________________ are individuals who collect and sell data. (2) The use of digital technology, such as social media, websites, and other online platforms to harass, threaten or intimidate individuals is called _____________. (3) The three primary privacy issues are: _________,__________ and _________. (4) ___________ is the process of coding information to make it unreadable except to those who have a key. (5) To prevent copyright violations, corporations often use ___________________ Please, go on to the next page….. Page 3 | 6 Inspire International Academy (6) Programs that come to a computer system disguised as something else are called _______________. (7) Software ______________ is the unauthorized copying and distribution of software. QUESTION 5: [1 point ×12 Questions = 12 points] 12 Choose the Correct Answer: (1) Hardware or software used to control access to a private network: (a) Hub (b) Switch (c) Bridge (d) Firewall (2) Computer criminals who create and distribute malicious programs. (a) DRM (b) Phishers (c) Crackers (d) Information brokers (3) Which of the following is not a malicious program. (a) VPN (b) Virus (c) Worm (d) Trojan horse (4) A malicious programs that repeatedly replicate themselves, clogging computers and networks. (a) VPN (b) Worms (c) Viruses (d) Trojan horses Please, go on to the next page….. Page 4 | 6 Inspire International Academy (5) _________ encrypt connections between company networks and remote users. (a) VPN (b) WPA2 (c) Zombies (d) Biometric (6) Remotely controlled computers used for malicious purposes. (a) Rogue (b) Zombies (c) Crackers (d) Trojan horses (7) The illegal and unethical representation of some other person’s work or ideas as your own without giving credit to the original source. (a) Identity theft (b) Spyware (c) Phishing (d) Plagiarism (8) ___________ is a type of scanning device such as fingerprint scanner. (a) Biometric (b) Web bug (c) Firewall (d) Digital signature (9) ____________ attempts to trick people into believing a fake website is real. (a) Spyware (b) Phishing (c) Trojan horse (d) Online identity Please, go on to the next page….. Page 5 | 6 Inspire International Academy (10) HTTPS stands for (a) High-level Transfer protocol service (b) High-level Transmission protocol secure (c) Hypertext Transmission protocol secure (d) Hypertext Transfer protocol secure (11) Privacy concern relates to the responsibility to ensure correct data collection. (a) Access (b) property (c) Identity (d) Accuracy (12) ___________ mode ensures that your browsing activity is not recorded. (a) Secret (b) Privacy (c) Cookies (d) keyloggers BONUS QUESTION {1 MARK} Give one measure to protect computer security. ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ End of exam. Good luck. Page 6 | 6