0% found this document useful (0 votes)
61 views2 pages

Mid Term Exam - Digital Litteracy and Communication

Uploaded by

aisya farra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views2 pages

Mid Term Exam - Digital Litteracy and Communication

Uploaded by

aisya farra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

MID TERM EXAM – DIGITAL LITTERACY AND

COMMUNICATION
1. There are several important parts in a computer, namely software and hardware. Briefly
describe how these two parts are connected to each other when we use our computers.
Give an example.
 hardware and software is an inseparable unit. hardware is like the "heart" of all computer
systems while software is the "soul" of the hardware itself. In fact, software controls
hardware. it can be said that hardware is just a container for software. for computers to
work effectively at manipulating data and creating useful products, hardware and
software must work together.
 for example: I play games using my smartphone
 I want to watch Netflix on my laptop.
 I use the printer to print my essay

2. There are 2 types of attacks on computer security, namely active and passive attacks.
Explain the difference between active and passive attacks. Give examples of each type
and provide solutions to prevent these attacks.

 Is an attack that uses information or can study the data contained in the system but
cannot affect system resources. These attacks can also change system resources and
affect the operation of these resources whereas Active attacks try to change system
resources or affect their operations. Is an attack that tries to even change the resources
on the system and affect the system.
 Examples of Passive Attacks: such as unencrypted e-mails or phone calls that will result
in the leakage of certain information by unknown persons.
 Example of an Active Attack: flooding a web server with more traffic than it can handle.
server downtime that occurs due to a lot of traffic or users on the web server that can't
be handled.

 Passive Attack Solution:

Our symmetrical keys still have a hard time exchanging secret keys secretly. Public key
encryption where each party involved in communication has 2 keys.

 Active Attack Solution:

Use passwords, which can help to contract transactions and sessions between
communicating parties. which ensures that an attacker who manages to record a message can
be caught, the associated password will expire at the time of the attack.
3. Internet of Thing (IoT) is a technology that connects all devices on the Internet. Give two
examples of IoT devices (except pc, laptop, cellphone, tablet, etc.). Describe how this
device works.
 Smart TV: commonly used to watch television shows. which is equipped with various
mobile applications on the TV.
 smart speaker: speakers that are no longer using cables and more often use bluetooth
devices that are directly connected to the smartphone.
 toys: ordinary smart toys are toys that use advanced technology, for example using a
remote control such as a robot and remote control or VR

4. Cryptography is a method for protecting information by manipulating the data code.


When someone receives encrypted information, he will not be able to understand the
information. Briefly describe how to encrypt our information before sending it to others.
Explain how the recipient can understand the encrypted information.

Encryption is the process of taking plain text, such as a text message or e-mail, and
scrambling it into an unreadable format - called "cipher text". This helps protect the
confidentiality of digital data either stored on computer systems or transmitted over networks
such as the internet.

The process of reading plain text, such as an e-mail message, that scrambles it into a format
that the recipient or password cannot read. encryption can help protect confidential messages
or e-mails or digital data well. When the intended recipient accesses the message, the
information is translated back into its original form. This is called decryption. When a recipient
who receives the message will access the message sent by the author, the information will be
translated back to its original form, therefore the recipient will understand well the contents of
the message. to unlock messages, both sender and recipient must use a "secret" encryption
key - or a set of algorithms that scrambles and parses data into a readable format

You might also like