BBS 140- 2021 Exams

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

KWAME NKRUMAH UNIVERSITY

SCHOOL OF BUSINESS STUDIES

BBS 140 INTRODUCTION TO ICT


ODL FINAL EXAMINATION

19TH OCTOBER, 2021

DURATION: THREE (3) HOURS MARKS: 100

INSTRUCTIONS

1. Check that you have the correct examination paper in front of you.
2. There are THREE (3) sections in this Examination Paper.
3. Section A & B are COMPULSORY.
4. Section C consists of five (5) questions; answer any four (4) questions.
5. Marks for each question are indicated in the brackets.
6. Number the questions correctly and start each question on a fresh page.
7. Write your student number on all the answer booklets used.
8. There shall be NO communication among students during the examination

DO NOT TURN THE PAGE UNTIL YOU ARE TOLD TO DO SO


SECTION A: [Multiple Choice Questions: COMPULSORY] [10 Marks]
1. Which of the following is a single-user operating system?
A. MAC
B. MS-DOS
C. Windows
D. Non of these
1. BIOS is used?
A. By Compiler
B. By interpreter
C. By application software
D. By operating system
2. What is the decimal equivalent for this binary 111111?
A. 63
B. 60
C. 64
D. 28
3. In HTML, <a> and </a> are the tags used for ______
A. Adding text
B. Adding image
C. Adding voiced text.
D. Adding links to your page
4. Which network topology requires a central controller or hub?
A. Star
B. Mesh
C. Ring
D. Bus
5. What is the correct HTML for creating a hyperlink?
A. <a> https://www.knu.co.zm</a>
B. <a name=https://www.knu.co.zm>KNU</a>
C. <a url=” https://www.knu.co.zm”>KNU</a>
D. <a href=” https://www.knu.co.zm”>KNU</a>
6. A scamming practice in which malicious code is installed on a personal computer or
server, misdirecting users to fraudulent web sites without their knowledge or
permission is known as____.
A. Phishing
B. Pharming
C. Man-in-the-middle attack
D. Cookies
7. A type of malicious program that demands payment after launching a cyber-attack
on a computer system is known as
A. Virus
B. Worms
C. Spyware
D. Ransomware
8. What is the binary equivalent to this decimal 255?
A. 11111111
B. 11111000
C. 11101101

2
D. 11111.11
9. ________ controls the operations of the CPU
A. ALU
B. CU
C. RAM
D. BU

SECTION B: [Answer True or False: COMPULSARY] [10marks]


i. A .pptx is a file extension associated and registered with Microsoft word..
ii. Metropolitan Area Network (MAN) is a type of network which serves
an area between 5 to 10 meters
iii. Programs which are as permanent as hardware and stored in ROM is known as a
Romware
iv. A coaxial cable is an example of a guided media.
v. N (N – 1) / 2 is used to calculate the number of possible connections on a network.
vi. The easiest way to convert a decimal number to its binary equivalent is to use the
Division Algorithm.
vii. Authentication means that a sender must not be able to deny a message that he
sent.
viii. Hardware or software designed to guard against unauthorized access to a
computer network is known as Encryption safe wall.
ix. The extensions used to save HTML pages are .html and .htm .
x. The RJ-45 has 8 pins while the RJ-11 has 4 pins..

SECTION C: [ANSWER ANY FOUR QUESTIONS]


Question One
Cybersecurity refers to the protection of internet-connected systems such as software,
hardware, electronic data, etc., from cyber-attacks. In a computing text, it is referred to as
protection against unauthorized access.
a. Discuss at least three (3) common types of cybersecurity attacks.[6marks]
b. For the answer in a), Explain ways in which you can prevent these attacks.
[6marks]
c. 9. In relation to information systems security, Briefly explain the following
clearly stating what they stand for: i. IDS ii. IPS. Discuss the difference between
the two? [8marks]

Question Two
Imagine you are hired as an IT Consultant and you have been tasked with the responsibility
of implementing a web server for “Kafwanka Entreprise”, to cater for all its web based
services.
a. With regards to internet protocols, briefly discuss the following clearly stating what
they stand for
i. IMAP
ii. SMTP
iii. FTP

3
iv. POP3[8marks]
b. Discuss the four parts of a URL 4marks]
c. Discuss the difference between the following [8marks]
i. Streaming files and non streaming files
ii. Dynamic and static web pages
iii. Hypertext and hypermedia
iv. Html elements and html tags

Question Three
a. Distinguish between a command-driven interface and a GUI giving
examples of Operating System with these interfaces.[6 marks]
b. Discuss the following forms of application software giving one example of each
[9marks]
i. Custom Software ii. Package software iv. Open source software
c. State what the following stands for: [5marks]
i. PCB ii. SATA iii. HDMI iv. IDE v.BIOS

Question Four

The Kwame Nkrumah University (KNU), School of Business ICT Department has employed
you as a capable IT Consultant to ensure all ICT Systems are implemented successfully.
a. Discuss four factors to consider when choosing the type of cable for your network [8
marks]
b. Discuss the difference between Intranet and Extranet and State technologies used in
implementing [6marks]
c. Discuss any two types of networks [4marks]
d. Mention any two layers from the OSI model.[2marks]

Question Five

The current COVID-19 situation has brought the focus on reducing human-to-human contact
to contain the spread of the virus. IoT technology is one of the pioneers in this area. In the
context of COVID-19, IoT-enabled/linked devices/applications are utilized to lower the
possible spread of COVID-19. Discuss the role that IoT is playing in the following industries
during the spread of the COVID-19 coronavirus. [20 marks]
a. Water Supply
b. Education
c. Entertainment
d. Banking sector

END OF THE EXAMINATION

You might also like