Introduction To ICT - Exam Paper ANSWER SHEET
Introduction To ICT - Exam Paper ANSWER SHEET
Introduction To ICT - Exam Paper ANSWER SHEET
Introduction to ICT
FINAL EXAM
1. ICT is
a. The technology required for information processing
b. The technology required for building communication systems
c. The technology required for building Internet Commerce solutions
d. All of above
10. Ability of an operating system to control activities of multiple programs at same time is
called
a. Multitasking c. Multi operating
b. Multi-processing d. Multi paging
11. Which one of the following correctly indicates the forensics investigation process?
a. Recovery -> Acquisition-> Analysis -> Presentation
b. Acquisition -> Recovery -> Analysis -> Presentation
c. Acquisition -> Recovery -> Presentation ->Analysis
d. Recovery -> Presentation -> Acquisition -> Analysis
13. Does web server fall under which major category of network component?
a. Network Device c. Media
b. Services d. End Devices
Page 3 of 19
14. Layer that are used to deal with mechanical and electrical specifications are?
a. Physical Layer c. Network Layer
b. Data Link Layer d. Transport Layer
15. Information is
a. Data c. Manipulated input
b. Processed Data d. Computer output
17. What is the range of practically possible values for the first octet of the default Class A IP
networks?
a. 0 to 126 b. 1 to 127 c. 1 to 126 d. 128 to 191
Page 4 of 19
21. Breach of consistency, accuracy, and trust worthiness of data over its entire life cycle (At
rest, in use, at motion) is a violation of,
a. Confidentially c. Availability
b. Integrity d. Nonrepudiation
22. Which layer in the OSI Model does the selection of best path to deliver the data.
a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4
23. Which one of the following describe high level information security requirement of an
organization?
a. Procedures b. Guidelines c. Standards d. Policies
Page 5 of 19
27. What is Shell? Select all matching answers
a. A command available in Unix and Linux OS
b. Acts as a security layer to the Linux Kernel
c. Acts as an interface between human and machine
d. All of above
29. Select two fields which you can find in both TCP header and UDP header?
a. Source IP Address c. Destination IP Address
b. Source port d. Destination port
30. Select two application services which utilize the UDP as its transport layer?
a. E-mail c. Voice
b. Video d. File transfer on FTP
34. Default Class B network contains how many IP addresses that can be assigned to actual
hosts?
a. 65,534 b. 65,532 c. 32,768 d. 32,766
Page 6 of 19
35. Firefox is
a. A user agent c. A search engine
b. A web browser d. A and B both
38. Which of the following header fields identify which TCP/IP application gets data
received by the computer?
a. Ethernet Type c. IP Protocol Field
b. SNAP Protocol Type d. TCP Port Number
Page 7 of 19
PART B: Short Answer Questions [60 Marks]
Data and information are closely related but distinct concepts in the context of information
systems:
Data refers to raw facts, figures, or symbols that have no inherent meaning by themselves. It
represents the basic elements of information and can be in the form of numbers, text, images, or
other types of symbols. For example, the numbers "10," "20," and "30" are data.
Information, on the other hand, is data that has been processed, organized, or structured to have
meaning or relevance. It results from analyzing, interpreting, or synthesizing data to derive
insights, make decisions, or communicate messages. For instance, the statement "Total sales for
the month of January were $10,000" is information derived from processing and organizing the
data "10," "20," and "30" into a meaningful context.
In summary, while data represents raw facts or figures, information is the result of processing
data to derive meaning or relevance, making it useful for decision-making or communication
purposes.
[3 Marks]
Page 8 of 19
3. Explain 1:1, 1:M, M:M relationships with sample ER Diagrams.
[4 Marks]
• In a 1:1 relationship, each entity instance in one entity set is associated with exactly
one entity instance in another entity set, and vice versa.
• Example: One employee is assigned to exactly one office, and each office is assigned
to exactly one employee.
Relationship (One-to-Many):
each entity instance in one entity set can be associated with multiple entity instances
in another entity set, but each entity instance in the other entity set is associated with
only one entity instance in the first entity set.
• Example: One department can have multiple employees, but each employee belongs
to only one department.
Relationship (Many-to-Many):
• relationship, each entity instance in one entity set can be associated with multiple
entity instances in another entity set, and vice versa.
• Example: Many students can enroll in multiple courses, and each course can have
multiple students enrolled.
Page 9 of 19
Question 02 [15 Marks]
1. Explain the purpose of using computer networks.
[2 Marks]
Computer networks enable communication and resource sharing among connected
devices, facilitating collaboration and connectivity. They allow users to exchange
data, access shared resources, and communicate seamlessly across different
platforms and applications. Overall, computer networks enhance efficiency,
productivity, and connectivity in both personal and professional settings.
2. What are the three (3) major aspects of a computer network
[2 Marks]
Connectivity
Communication Protocols
Network Services and Applications
Page 10 of 19
4. Briefly explain Bandwidth
[2 Marks]
Bandwidth refers to the maximum amount of data that can be transmitted over a
network connection in a given period of time. It is typically measured in bits per
second (bps) or multiples thereof, such as kilobits per second (Kbps), megabits per
second (Mbps), or gigabits per second (Gbps). Bandwidth determines the speed and
capacity of a network connection, with higher bandwidth allowing for faster data
transfer rates and more simultaneous data transmissions. In essence, bandwidth
represents the capacity of a network link to carry data from one point to another
within a specified timeframe.
5. Write three (3) advantages of a Leased Line
[6 Marks]
Dedicated Connection: Leased lines offer a dedicated, fixed-bandwidth connection between two
points, providing consistent and reliable performance for data transmission.
High Reliability: Leased lines typically come with service level agreements (SLAs) that guarantee
uptime and reliability, making them suitable for critical applications and businesses that require
uninterrupted connectivity.
Symmetrical Bandwidth: Leased lines often offer symmetrical bandwidth, meaning the upload and
download speeds are the same, which is beneficial for applications requiring high-speed data
transfer in both directions.
Page 11 of 19
Question 03 [15 Marks]
Linux is a Unix-Like operating system. All the Linux/Unix commands are run in the terminal
provided by the Linux system. This terminal is just like command prompt of Windows OS.
Linux/Unix commands are case-sensitive. The terminal can be used to accomplish all
Administrative tasks.
1. Define following terms:
a. The Shell
The Shell: The shell is a command-line interpreter that provides a user interface for accessing the
operating system's services. It allows users to interact with the operating system by entering
commands and executing programs. The shell interprets these commands and translates them
into instructions that the operating system can understand and execute. Examples of shells
include Bash (Bourne Again Shell), Zsh (Z Shell), and Csh (C Shell).
b. Relative path
Relative Path: A relative path is a reference to a file or directory location relative to the current
working directory. Instead of specifying the complete or absolute path from the root directory, a
relative path indicates the location of a file or directory based on the current directory. For
example, if the current directory is "/home/user", a relative path "../documents" would refer to
the "documents" directory located one level up from the current directory.
c. Command Parameters
Command Parameters: Command parameters, also known as command-line arguments, are
additional inputs provided to a command when it is executed in the terminal. These parameters
modify the behavior of the command or specify the data or files on which the command should
operate. Command parameters are typically preceded by flags or options and can include values
or filenames. For example, in the command "ls -l /home/user", "-l" is a command parameter that
specifies the long listing format, and "/home/user" is the directory on which the "ls" command
should operate.
[6 Marks]
2. Briefly differentiate the uses of “touch” and “cat” commands
touch:
• The "touch" command is used to create a new empty file or update the timestamp of an
existing file without modifying its contents. It is commonly used to create placeholder
files or update file timestamps to the current time
Page 12 of 19
cat:
• The "cat" command is used to concatenate and display the contents of one or more files.
It is often used to view the contents of text files, concatenate files together, or redirect
file contents to other commands or files. Additionally, "cat" can be used to create new
files or append content to existing files when combined with output redirection
operators.
[1 Mark]
3. Briefly (one line each) write four (4) most prominent events leading to the creation
of Linux
• Development of Unix: The creation of Unix by AT&T Bell Labs in the 1970s laid the
foundation for Unix-like operating systems.
• GNU Project: Richard Stallman initiated the GNU Project in 1983 to develop a free Unix-like
operating system, providing essential tools and components.
• Lack of a Free Kernel: The absence of a free kernel led to the development of the Linux
kernel by Linus Torvalds in 1991.
• Combination of GNU and Linux: The merging of the Linux kernel with GNU components
formed the basis of the Linux operating system, creating a fully functional and free Unix-like OS.
[8 Marks]
Page 13 of 19
Question 04 [15 Marks]
A global computer network providing a variety of information and communication facilities,
consisting of interconnected networks using standardized communication protocols.
1. Define following terms
a. The Internet
The Internet: The Internet is a global computer network that provides a wide range of information and
communication services to users worldwide. It consists of interconnected networks that use
standardized communication protocols to enable the exchange of data and facilitate communication and
collaboration across geographical boundaries.
b. IP address
IP address: An IP address (Internet Protocol address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. It serves as an
identifier for the device's network interface and enables devices to communicate with each other over
the Internet. IP addresses are used for routing data packets to their intended destinations and are
typically represented in a dotted-decimal format, such as "192.168.1.1
c. HTML
HTML (Hypertext Markup Language): HTML is the standard markup language used to create and
structure web pages on the World Wide Web. It consists of a set of markup tags that define the structure
and layout of web content, including text, images, links, and multimedia elements. HTML tags are
enclosed in angle brackets (< >) and are used to specify headings, paragraphs, lists, tables, forms, and
other elements on a web page. HTML documents are interpreted by web browsers to render web pages
for users to view and interact with on the Internet.
[6 Marks]
2. Briefly describe the differences between “Internet” and “Web”
• The Internet is a global network of interconnected computer networks that spans the
globe, facilitating communication and data exchange among devices worldwide.
• The Web, short for World Wide Web, is a collection of interconnected documents and
resources accessible via the Internet. It is a subset of the Internet and represents the
networked system of web pages, websites, and web applications.
[5 Marks]
Page 14 of 19
3. What is “Netiquette”? Briefly explain with two (2) examples.
[4 Marks]
“Netiquette” refers to the etiquette or rules of behavior governing communication and interaction
on the internet. It encompasses guidelines and norms for respectful and appropriate online
behavior, promoting civility, professionalism, and effective communication in digital
environments.
1. Use Proper Language: Avoid using offensive language, profanity, or derogatory remarks
when communicating online, whether in emails, forums, social media, or other platforms.
Use respectful and polite language to foster a positive and inclusive online community.
2. Respect Privacy and Copyright: Respect the privacy and intellectual property rights of
others by refraining from sharing personal information without consent and adhering to
copyright laws when sharing or using content online. Give credit to the original creators
and obtain permission before reposting or redistributing content.
Page 15 of 19
Question 5 [10 Marks]
[3 Marks]
The Software Development Life Cycle (SDLC) is a structured process used by software
development teams to design, develop, test, and deploy software applications. It consists of a
series of phases or stages that guide the development process from initial concept to final
product release and maintenance. The typical stages of the SDLC include:
The SDLC provides a systematic approach to software development, helping teams manage
resources effectively, maintain consistency, and deliver high-quality software products that
meet the needs of stakeholders.
[3 Marks]
The Waterfall Model is a sequential software development process model in which the phases
of the software development life cycle (SDLC) are executed linearly, with each phase
dependent on the deliverables of the previous phase. The typical phases of the Waterfall
Model include:
Page 16 of 19
4. Testing: Conducting various types of testing, such as unit testing, integration testing,
and system testing, to detect and fix defects and ensure the quality and functionality
of the software.
5. Deployment: Deploying the software application to the production environment or
end-users, including installation, configuration, and migration of data.
6. Maintenance: Providing ongoing support, updates, and enhancements to the software
to address issues, improve performance, and add new features throughout its lifecycle.
The Waterfall Model follows a linear and sequential approach, with each phase acting as a
prerequisite for the next phase. Once a phase is completed, it is not revisited, and any changes
or modifications to requirements are difficult to accommodate later in the development
process. Despite its rigidity and lack of flexibility, the Waterfall Model is suitable for projects
with well-defined and stable requirements, where the scope and objectives are clear from the
outset.
[3 Marks]
Agile methodology is an iterative and incremental approach to software development that emphasizes
flexibility, collaboration, and customer feedback throughout the development process. Unlike
traditional waterfall methods, Agile breaks the development process into small, manageable iterations
called sprints, allowing teams to deliver working software incrementally and adapt to changing
requirements.
Page 17 of 19
4. What are the Characteristics of good software?
[3 Marks]
• Reliability: The software should perform consistently and predictably under various conditions,
without unexpected failures or errors.
• Usability: The software should be easy to learn, use, and navigate, with an intuitive user interface
and clear instructions.
• Efficiency: The software should use system resources effectively and efficiently, minimizing
response times and maximizing performance.
• Maintainability: The software should be easy to maintain and update, with well-organized and
modular code that facilitates modifications and enhancements.
• Portability: The software should be compatible with different hardware platforms, operating
systems, and environments, allowing it to be easily deployed and run across diverse systems.
• Scalability: The software should be able to handle increasing volumes of data or users without
significant degradation in performance or functionality.
• Security: The software should protect sensitive data and resources from unauthorized access,
ensuring confidentiality, integrity, and availability.
• Compatibility: The software should be compatible with other software systems, standards, and
protocols, allowing seamless integration and interoperability.
• Robustness: The software should be able to handle unexpected inputs or conditions gracefully, with
robust error handling and recovery mechanisms.
• Adaptability: The software should be adaptable to changing requirements, technologies, and user
needs, allowing it to evolve and remain relevant over time.
Page 18 of 19
5. What did you mean from a quality software application?
[3 Marks]
A quality software application refers to a software product that meets or exceeds user expectations and
fulfills its intended purpose effectively and efficiently. Quality software applications exhibit several
key characteristics:
1. Reliability: The application should perform consistently and predictably under various
conditions, with minimal downtime or unexpected failures.
2. Usability: The application should be easy to learn, use, and navigate, with an intuitive user
interface and clear instructions that facilitate user interaction.
3. Functionality: The application should provide all the features and functionality required to
accomplish its intended tasks, meeting user requirements and expectations.
4. Performance: The application should perform efficiently, with fast response times and
minimal resource usage, ensuring a smooth and responsive user experience.
5. Security: The application should protect sensitive data and resources from unauthorized access
or malicious attacks, ensuring confidentiality, integrity, and availability.
6. Scalability: The application should be able to handle increasing volumes of data or users
without significant degradation in performance or functionality.
7. Maintainability: The application should be easy to maintain, update, and extend, with well-
organized and modular code that facilitates modifications and enhancements.
8. Compatibility: The application should be compatible with different hardware platforms,
operating systems, and environments, ensuring seamless integration and interoperability with
other systems and software.
9. Adaptability: The application should be adaptable to changing requirements, technologies, and
user needs, allowing it to evolve and remain relevant over time.
Overall, a quality software application is one that delivers value to its users, meets their needs and
expectations, and provides a positive and satisfying user experience.
Page 19 of 19