WAEC 2016 COMPUTER QUESTIONS AND ANSWERS NOW AVAILABLE FOR FREE. @ Gurushood.com

By 01:57 Thu, 14 Apr 2016 Comments


WAEC 2016 COMPUTER QUESTIONS AND ANSWERS NOW AVAILABLE FOR FREE

Thursday 14th April 2016

COMPUTER STUDIES 2 (ESSAY)

COMPUTER STUDIES 1 (OBJ)

Gurushood.com

1ai )

Networking cables are networking hardware used

to connect one network device to other network

devices or to

connect two or more computers to share printer,

scanner etc .

1aii )

i ) Coaxial cable

ii )Optical fiber cable

iii )Patch cable

1b)

Very Small Aperture Terminal

1c )

-An e – mail address is used to receive e –

mail messages and is under the

nomenclature :

Nameofyourchoice @ domain. com

-website URL is an IP address

in text resolved by your DNS server and often

has nomenclature like this:

www . nameofyourchoice. com

1cii )

i ) www . gurushood. com

ii )gurushood@ gmail. com

2ai )

A computer virus is a malware that , when

executed, replicates by inserting copies of itself

(possibly modified) into

other computer programs , data files, or the boot

sector of the hard drive; when this replication

succeeds , the affected areas are then said to be

” infected ” .

2aii )

i ) Resident Viruses

ii )Multipartite Viruses

iii )Direct Action Viruses

2b)

i ) Vulnerabilities and attacks- s a system

susceptibility

or flaw , and many vulnerabilities are

documented in the Common Vulnerabilities and

Exposures ( CVE ) database and vulnerability

management

is the cyclical practice of identifying ,

classifying , remediating , and mitigating

vulnerabilities as they are discovered .

ii )Backdoors – in a computer system , a

cryptosystem or an algorithm, is any secret

method of bypassing normal

authentication or security controls .

iii )Denial -of- service attack- are designed to

make a machine or network resource

unavailable to its intended users.

Attackers can deny service to individual

victims , such as by deliberately entering a

wrong password enough consecutive times to

cause the victim account to be

locked, or they may overload the

capabilities of a machine or network and

block all users at once .

iv )Eavesdropping- is the act of surreptitiously

listening to a private conversation,

typically between hosts on a network . For

instance, programs such as Carnivore and

NarusInsight have been used by the FBI and NSA

to eavesdrop on the systems of internet service

providers .

v )Privilege escalation- describes a situation where

an attacker with some level of

restricted access is able to , without

authorization , elevate their privileges or

access level.


Advertisement pool

Advertisement





Related Article

Comment
Name




.....................

Please LOGIN or REGISTER To Gain Full Access To This Article