CERTIFIED COMPUTER SCIENCE OBJECTIVES
__________________________
1.A
2.A
3.C
4.B
5.C
6.D
7.B
8.C
9.A
10.B
_______________________
11.A
12.B
13.C
15.A
16.C
17.C
18.B
19.C
20.D
_______________________
21.C
22.A
23.B
24.C
25.A
26.A
27.C
28.B
29.C
30.A
________________________
31.B
32.D
33.D
34.B
35.B
36.A
37.C
38.D
39.B
40.C
__________________________
41.A
42.B
43.D
44.B
45.B
46.A
47.D
48.C
49.A
50.D
__________________________
1ai )
Networking cables are networking hardware
used to connect one network device to other
network devices or to
connect two or more computers to share
printer , scanner etc.
1aii )
i ) Coaxial cable
ii) Optical fiber cable
iii ) Patch cable
1b )
Very Small Aperture Terminal
1c )
-An e-mail address is used to receive e-
mail messages and is under the
nomenclature :
Nameofyourchoice @ domain.com
-website URL is an IP address
in text resolved by your DNS server and
often has nomenclature like this :
www.nameofyourchoice .com
2ai )
A computer virus is a malware that, when
executed, replicates by inserting copies of
itself ( possibly modified) into
other computer programs , data files , or the
boot sector of the hard drive ; when this
replication succeeds , the affected areas are
then said to be "infected ".
2aii )
i ) Resident Viruses
ii) Multipartite Viruses
iii ) Direct Action Viruses
2b )
i ) Vulnerabilities and attacks-s a system
susceptibility
or flaw , and many vulnerabilities are
documented in the Common Vulnerabilities
and Exposures ( CVE ) database and
vulnerability management
is the cyclical practice of identifying ,
classifying, remediating , and mitigating
vulnerabilities as they are discovered .
ii) Backdoors - in a computer system , a
cryptosystem or an algorithm , is any secret
method of bypassing normal
authentication or security controls.
iii ) Denial -of- service attack -are designed to
make a machine or network resource
unavailable to its intended users.
Attackers can deny service to individual
victims , such as by deliberately entering a
wrong password enough consecutive times
to cause the victim account to be
locked, or they may overload the
capabilities of a machine or network and
block all users at once .
iv ) Eavesdropping - is the act of
surreptitiously
listening to a private conversation ,
typically between hosts on a network. For
instance, programs such as Carnivore and
NarusInsight have been used by the FBI and
NSA to eavesdrop on the systems of internet
service providers.
v) Privilege escalation-describes a situation
where an attacker with some level of
restricted access is able to , without
authorization , elevate their privileges or
access level .
4a) more coming pls bear with us
4b)
i)Floppy, Hard Drive
4c)
i)System software
ii)Application software
4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader
4c)-System software is computer software designed to operate and control the computer hardware as well as to run application sosoftware.
eg web browsers
-Application software is readily apparent and visible to the user.
eg. business productivity programs.
We appreciate you for reading Expocrew.net, but we think it will be better you like our facebook fanpage and also follow us on twitter below.