THEORY ANSWERS
================================
CERTIFIED COMPUTER SCIENCE OBJECTIVES
__________________________
1-10: AACBCDBCAB
11-20: ABCDACCBCD
21-30: CABCAACBCA
31-50: BDDBBACDBC
41-50: ABDBBADCAD
__________________________
wait as we solve the rest
(4a)
8 bits = 1 byte
1000 byte = 1 kilobyte
1000 kilobytes = 1 megabyte
.:. 24000 bytes = 0.003 megabyte
Each line = 0.003mb
then 16 lines = 16x0.003 = 0.048mb
Electronic book pages = 500 pages
Megabyte space occupied by 500 pages ebook = 500 x
0.048
=24megabytes
ie 24mb
4b)
i)Floppy, Hard Drive
4c)
i)System software
ii)Application software
4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader.
5a.
i syntax
ii Reserved ranges
5b)
2ai ) A computer virus is a malware that , when executed, replicates by inserting copies of itself (possibly modified) into other computer programs , data files, or the boot sector of the hard drive; when this replication succeeds , the affected areas are then said to be " infected " .
2aii ) i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses
2b) i ) Vulnerabilities and attacks- s a system susceptibility or flaw , and many vulnerabilities are documented in the Common Vulnerabilities and Exposures ( CVE ) database and vulnerability management is the cyclical practice of identifying , classifying , remediating , and mitigating vulnerabilities as they are discovered .
ii )Backdoors - in a computer system , a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls .
iii )Denial -of- service attack- are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims , such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once .
iv )Eavesdropping- is the act of surreptitiously listening to a private conversation, typically between hosts on a network . For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers .
v )Privilege escalation- describes a situation where an attacker with some level of restricted access is able to , without authorization , elevate their privileges or access level. .
1ai ) Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printer, scanner etc .
1aii ) i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable
1b) Very Small Aperture Terminal
1ci) Difference Between Email address And Web Address. The simplest way to tell the difference is an email address always contains the ‘at sign’ (@), and a website address never does. Also, An e- mail address is a web service used to send and receive messages and web address is collection of static and dynamic web pages to perform several tasks like shopping, searching information, other govt. work purpose.
1cii)1ii) Types Of email.
i)Djbadoo@ymail.com ii)Donpizzy@gmail.com
Types Of Website
i)www.jamb.org.ng
ii)www.waecdirect.org
More Answers Loading
2 comments
Write commentsTnx PatricsoN
ReplyYour're welcome sir
Reply